信管网每日一练
信息安全工程师 - 每日一练 导航

信息安全工程师每日一练试题(2026/4/26)

2026年04月27日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2026/4/26)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2026/4/26)

  • 试题1

    在网络安全等级保护标准2.0的可信验证实施框架中,当检测到系统或应用程序的可信性受到破坏时,系统会如何响应?
    A. 仅进行内部日志记录,不采取任何外部行动
    B. 立即停止所有网络服务,以防止进一步损害
    C. 报警并将验证结果形成审计记录送至安全管理中心
    D. 自动修复受损的系统或应用程序

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题2

    在信息安全行业中,全同态加密技术的最大优势是(   )
    A. 提高数据传输速度
    B. 简化加密解密过程
    C. 允许在不泄露信息的情况下对数据进行处理
    D. 增强数据的完整性验证

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题3

    能有效控制内部网络和外部网络之间的访问及数据传输,从而达到保护内部网络的信息不受外部非授权用户的访问和对不良信息的过滤的安全技术是( )
    A.入侵检测
    B.反病毒软件
    C.防火墙
    D.计算机取证

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题4

    The Cybersecurity Level Protection 2.0 Standard strengthens the requirements for the use of trusted computing technologies, with additional "trusted verification" control points at each level. Among them, ( ) requires trusted verification of the device's system boot programs, system programs, and the like,
    A. Level 3
    B. Level 4
    C. Level 1
    D. Level 2

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题5

    在工业控制系统中,为确保资产安全,以下哪项措施是首要任务?
    A.立即安装最新的安全补丁
    B.建设工业控制系统资产清单并明确责任人
    C.对所有设备进行冗余配置
    D.部署防病毒软件

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题6

    关于状态防火墙处理包流程时的操作不正确的是(  )
    A.检查数据包的有效性之前需要先查找会话表
    B.查找会话表时,若找到,则进一步检查数据包的序列号和会话状态
    C.数据包若无效,则丢掉数据包并审计
    D.当会话表中没有新到的数据包信息时,则查找策略表

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题7

    Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
    Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
    (1) A.main
    B.same
    C.public
    D.secret
    (2) A.stream
    B.different
    C.public
    D.secret
    (3) A.different
    B.same
    C.public
    D.private
    (4) A.different
    B.same
    C.public
    D.private
    (5) A.private-key
    B.public-key
    C.stream
    D.Hash


    查看答案

    试题参考答案:D、C、B、A、B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题8

    (   )攻击方式可能通过利用TCP/IP协议漏洞来实。
    A.虚拟机逃逸
    B.拒绝服务攻击
    C.虚拟机镜像污染
    D.跨站脚本攻击

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题9

    利用公开密钥算法进行数据加密时,采用的方法是( )
    A、发送方用公开密钥加密,接收方用公开密钥解密
    B、发送方用私有密钥加密,接收方用私有密钥解密
    C、发送方用公开密钥加密,接收方用私有密钥解密
    D、发送方用私有密钥加密,接收方用公开密钥解密

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

  • 试题10

    Trust is typically interpreted as a subjective belief in the reliability, honesty and  security  of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to  policy . A consequence of this is that a trust component of a system must work correctly in order   for the security of that system to hold, meaning that when a trusted(  )fails , then the sytems and applications that depend on it can(  )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed   policy in order to ensure the expected level of securty and quality of services . A paradoxical   conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.
    Trusted components typically follows the principle of the weakest link , that is ,in many situations the the overall security can only be as strong as the least reliable or least secure of all the trusted components. We cannot avoid using trusted security components,but the fewer the better. This is important to understand when designing the  identity management architectures,that is, fewer the trusted parties in an identity management model , stronger the security that can be achieved by it.
    The transfer of the social constructs of identity and trust into digital and computational concepts helps in designing and implementing large scale online markets and communities,and also plays an important role in the converging mobile and Internet environments.Identity management (denoted Idm hereafter ) is about recognizing and verifying the correctness of identitied in online environment .Trust management becomes a component of (  )whenever different parties rely on each other for identity provision and authentication . IdM and Trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining  authorisation policies in personalised services.
    Establishing trust always has a cost, so that having  complex trust requirement typically leads to high overhead in establishing the required trust. To reduce costs there will be incentives for stakeholders to “cut corners”regarding trust requirements ,which could lead to inadequate security . The challenge is to design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed .The establishment of initial(  )usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
    (71)A.with
    B. on
    C. of
    D. for
    (72)A.entity
    B.person
    C.component
    D.thing
    (73)A. No longer
    B. never
    C. always
    D.often
    (74)A. SP
    B. IdM
    C.Internet
    D.entity
    (75)A.trust
    B.cost
    C.IdM
    D. solution

    查看答案

    试题参考答案:D、C、A、B、A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2026/4/26

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:

信管网 - 信息系统项目管理专业网站

下载APP-在线学习