信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2026/4/13)

2026年04月14日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2026/4/13)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2026/4/13)

  • 试题1

    攻击者隐藏自己的行踪,通常用到的技术不包括(  )
    A.冒充其他用户
    B.使用重定向技术减少ps给出的信息量
    C.让系统管理员运行特洛伊木马
    D.利用字符串相似麻痹系统管理员

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题2

    关于单硬盘内外区分技术的描述,不正确的是(   )
    A.当连接外部网时,就启用对外的硬盘分区,与外部网直接物理相连,但与内部LAN断开,而且不可访问内部使用的硬盘分区。
    B.单硬盘内外区分技术提供数据分类存放和加工处理
    C.单硬盘内外区分技术实现一台PC功能多用,节省资源开支
    D.特洛伊木马程序不会给单硬盘内外区分技术带来安全威胁

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题3

    利用公开密钥算法进行数据加密时,采用的方式是(  )。
    A.发送方用公开密钥加密,接收方用公开密钥解密
    B.发送方用私有密钥加密,接收方用私有密钥解密
    C.发送方用公开密钥加密,接收方用私有密钥解密
    D.发送方用私有密钥加密,接收方用公开密钥解

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题4

    所有资源只能由授权方或以授权的方式进行修改,即信息未经授权不能进行改变的特性是指信息的( )。
    A.完整性
    B.可用性
    C.保密性
    D.不可抵赖性

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题5

    以下哪种身份鉴别技术通常被认为是提供了最高级别的安全保护?
    A.用户名/口令
    B.U盾
    C.人脸识别
    D.基于证书的统一用户身份管理

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题6

    网络系统中针对海量数据的加密,通常不采用( )
    A、链路加密
    B、会话加密
    C、公钥加密
    D、端对端加密

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题7

    在路由器配置中,哪项命令用于保存加密的口令密文,以增强路由器的口令安全?
    A.Enable secret
    B.key chain
    C.key-string
    D.no ip finger

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题8

    There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
    Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB  is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
    (1)
    A.message
    B、information
    C、requests
    D、data
    (2)
    A.methods
    B、cases
    C、hands
    D、sections
    (3)
    A.bad
    B、real
    C、fake
    D、new
    (4)
    A.user
    B、administrator
    C、editor
    D、attacker
    (5)
    A.or
    B、of
    C、in
    D、to

    查看答案

    试题参考答案:C、B、C、D、B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题9

    关于虚拟专用网(VPN)的描述,不正确的是(    )
    A.VPN是网络通信安全保护的常用技术。
    B.VPN把需要经过公共网传递的报文加密处理后,再由公共网络发送到目的地。
    C.经过VPN传输的数据在公共网上具有保密性
    D.VPN的“虚拟”是指网络连接特性是物理的而不是逻辑的。

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

  • 试题10

    在ApacheWeb主要面临的安全威胁中,SQL注入属于(   )
    A.软件配置威胁
    B.安全机制威胁
    C.应用程序威胁
    D.服务内容威胁

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/13

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习