信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class27-6-1.aspx
信息安全工程师每日一练试题(2018/8/30)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2018/8/30
信息安全工程师每日一练试题内容(2018/8/30)
试题
1:
下图是发送者利用不对称加密算法向接收者传送信息的过程,图中k1是( )。
A. 接收者的公钥
B. 接收者的私钥
C. 发送者的公钥
D. 发送者的私钥
试题解析与讨论:
www.cnitpm.com/st/12042.html试题参考答案:A
试题
2:
攻击者通过搭线或在电磁波辐射范围内安装截收装置等方式获得机密信息,或通过对信息流量和流向、通信频率和长度等参数的分析推导出有用信息的威胁称为( )
A、破坏
B、抵赖
C、截取
D、窃取
试题解析与讨论:
www.cnitpm.com/st/42331458.html试题参考答案:C
试题
3: 公司总部与分部之间需要传输大量数据,在保障数据安全的同时又要兼顾密钥算法效率,最合适的加密算法是()。
A. RC-5
B. RSA
C. ECC
D. MD5
试题解析与讨论:
www.cnitpm.com/st/1295828412.html试题参考答案:A
试题
4: An architectural style defines as a family of such systems in terms of a(1)of structural organization.More specifically, an architectural style defines a vocabulary of (2)and connector types, and a set of (3) on how they can be combined. For many styles there may also exist one or more (4)that specify how to determine a system's overall properties from the properties of its parts.Many of architectural styles have been developed over the years.
The best-known examples of(5)architectures are programs written in the Unix shell.
(1)A. pattern
B. data flow
C. business process
D. position level
(2)A. metadata
B. components
C. models
D. entities
(3)A. functions
B. code segments
C. interfaces
D. constraints
(4)A. semantic models
B. weak entities
C. data schemas
D. business models
(5)A. event-based
B. object-oriented
C. pipe-and-filter
D. layered
试题解析与讨论:
www.cnitpm.com/st/129643982.html试题参考答案:A、B、D、A、C
试题
5:
数字证书被撤销后存放于( )
A. CA
B.CRL
C. ACL
D.RA
试题解析与讨论:
www.cnitpm.com/st/2300729980.html试题参考答案:B
试题
6:
实时操作系统(RTOS)内核与应用程序之间的接口称为( )。
A.I/O接口
B.PCI
C.API
D.GUI
试题解析与讨论:
www.cnitpm.com/st/2867029381.html试题参考答案:
试题
7:
甲、乙、丙、丁4人加工A、B 、C、D四种工件所需工时如下表所示。指派每人加工一种工件,四人加工四种工件其总工时最短的最优方案中,工件B应由()加工。
A.甲
B.乙
C.丙
D.丁
试题解析与讨论:
www.cnitpm.com/st/289533703.html试题参考答案:D