信息安全工程师当天每日一练试题地址:http://www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:http://www.cnitpm.com/class27-6-1.aspx
信息安全工程师每日一练试题(2017/6/25)在线测试:http://www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2017/6/25
信息安全工程师每日一练试题内容(2017/6/25)
试题
1:
为了对计算机信息系统的安全威胁有更全面、更深刻的认识,信息应用系统安全威胁的分类方法一般用( )三种“综合分类”方法。
A. 高、中、低
B. 对象的价值、实施的手段、影响(结果)
C. 按风险性质、按风险结果、按风险源
D. 自然事件、人为事件、系统薄弱环节
试题解析与讨论:
http://www.cnitpm.com/st/22979.html试题参考答案:C
试题
2:
访问控制是为了限制访问主体对访问客体的访问权限,从而使计算机系统在合法范围内使用的安全措施,以下关于访问控制的叙述中,()是不正确的
A、访问控制包括2个重要的过程:鉴别和授权
B、访问控制机制分为2种:强制访问控制(MAC)和自主访问控制(DAC)
C、RBAC基于角色的访问控制对比DAC的先进之处在于用户可以自主的将访问的权限授给其它用户
D、RBAC不是基于多级安全需求的,因为基于RBAC的系统中主要关心的是保护信息的完整性,即”谁可以对什么信息执行何种动作”
试题解析与讨论:
http://www.cnitpm.com/st/1926829474.html试题参考答案:C
试题
3:
访问控制表与访问能力表相比,具有以下那个特点:()
A、访问控制表更容易实现访问权限的特点
B、访问能力表更容易浏览访问权限
C、访问控制表回收访问权限更困难
D、访问控制表更适用于集中式系统
试题解析与讨论:
http://www.cnitpm.com/st/2651922542.html试题参考答案:D
试题
4:
网络安全领域,VPN通常用于建立()之间的安全访问通道。
A、 总部与分支机构、与合作伙伴、与移动办公用户、远程用户;
B、 客户与客户、与合作伙伴、远程用户;
C、 同一个局域网用户;
D、 仅限于家庭成员;
试题解析与讨论:
http://www.cnitpm.com/st/267601432.html试题参考答案:A
试题
5:
关于监理过程中成本控制,下列说法中正确的是?()
A.成本只要不超过预计的收益即可
B.成本应控制得越低越好
C.成本控制由承建单位实现,监理单位只能记录实际开销
D.成本控制的主要目的是在批准的预算条件下确保项目保质按期完成
试题解析与讨论:
http://www.cnitpm.com/st/273878960.html试题参考答案:D
试题
6: An organization has a mix of access points that cannot be upgraded to stronger security and newer access points having advanced wireless security. An IS auditor recommends replacing the nonupgradeable access points. Which of the following would BEST justify the IS auditor's recommendation?
A、The new access points with stronger security are affordable.
B、The old access points are poorer in terms of performance.
C、The organization's security would be as strong as its weakest points.
D、The new access points are easier to manage.
试题解析与讨论:
http://www.cnitpm.com/st/2927616282.html试题参考答案:C
试题
7: An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to recommend improving the:
A、EDI trading partner agreements.
B、physical controls for terminals.
C、authentication techniques for sending and receiving messages.
D、program change control procedures.
试题解析与讨论:
http://www.cnitpm.com/st/293215913.html试题参考答案:C
试题
8: Which of the following types of firewalls would BEST protect a network from an Internet attack?
A、Screened subnet firewall
B、Application filtering gateway
C、Packet filtering router
D、Circuit-level gateway
试题解析与讨论:
http://www.cnitpm.com/st/294741104.html试题参考答案:A
试题
9: When segregation of duties concerns exist between IT support staff and end users, what would be a suitable compensating control?
A、Restricting physical access to computing equipment
B、Reviewing transaction and application logs
C、Performing background checks prior to hiring IT staff
D、Locking user sessions after a specified period of inactivity
试题解析与讨论:
http://www.cnitpm.com/st/2955015870.html试题参考答案:B
试题
10: Many organizations require an employee to take a mandatory vacation (holiday) of a week or more to:
A、ensure the employee maintains a good quality of life, which will lead to greater productivity.
B、reduce the opportunity for an employee to commit an improper or illegal act.
C、provide proper cross-training for another employee.
D、eliminate the potential disruption caused when an employee takes vacation one day at a time.
试题解析与讨论:
http://www.cnitpm.com/st/297414698.html试题参考答案:B