信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class27-6-1.aspx
信息安全工程师每日一练试题(2019/2/5)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2019/2/5
信息安全工程师每日一练试题内容(2019/2/5)
试题
1:
为了对计算机信息系统的安全威胁有更全面、更深刻的认识,信息应用系统安全威胁的分类方法一般用( )三种“综合分类”方法。
A. 高、中、低
B. 对象的价值、实施的手段、影响(结果)
C. 按风险性质、按风险结果、按风险源
D. 自然事件、人为事件、系统薄弱环节
试题解析与讨论:
www.cnitpm.com/st/22979.html试题参考答案:C
试题
2:
下列选项中,( )是最安全的信息系统。
A. ERP-CRM
B. MRPII
C. MIS-S
D. S-MIS
试题解析与讨论:
www.cnitpm.com/st/350121.html试题参考答案:D
试题
3:
在信息系统安全管理中,业务流控制,路由选择控制和审计跟踪等技术主要用于提高信息系统的( )。
A.保密性
B.可用性
C.完整性
D.不可抵赖性
试题解析与讨论:
www.cnitpm.com/st/2832975.html试题参考答案:B
试题
4:
( )是目前常用的数字签名算法。
A、RSA
B、DES
C、DSA
D、EDI
试题解析与讨论:
www.cnitpm.com/st/55601915.html试题参考答案:A
试题
5:
实现VPN的关键技术主要有隧道技术、加解密技术、 (1) 和身份认证技术。如果需要在传输层实现VPN,可选的协议是 (2) 。
(1)A、入侵检测技术
B、病毒防治技术
C、安全审计技术
D、密钥管理技术
(2)A、L2TP
B、PPTP
C、TLS
D、IPsec
试题解析与讨论:
www.cnitpm.com/st/72922511.html试题参考答案:D、C
试题
6:
对实际应用问题建立数学模型并求得结果后,还需要根据建模的目的和要求,利用相关知识,结合研究对象的特点,进行模型分析。模型分析工作一般不包括()。
A模型的合理性分析
B.模型的误差分析
C.模型的先进性分析
D.参数的灵敏性分析
试题解析与讨论:
www.cnitpm.com/st/127012690.html试题参考答案:C
试题
7: 以下关于企业信息化方法的叙述中,正确的是()。
A.业务流程重构是对企业的组织结构和工作方法进行重新设计,SCM(供应链管理)是一种重要的实现手段
B.在业务数量浩繁且流程错综复杂的大型企业里,主题数据库方法往往形成许多“信息孤岛”,造成大量的无效或低效投资
C.人力资源管理把企业的部分优秀员工看作是一种资本,能够取得投资收益
D.围绕核心业务应用计算机和网络技术是企业信息化建设的有效途径
试题解析与讨论:
www.cnitpm.com/st/129926782.html试题参考答案:D
试题
8: 软件()是指改正产生于系统开发阶段而在系统测试阶段尚未发现的错误。
A.完善性维护
B.适应性维护
C.正确性维护
D.预防性维护
试题解析与讨论:
www.cnitpm.com/st/129975011.html试题参考答案:B
试题
9: Information systems design is defined as those tasks that focus on the specification of a detailed computer-based solution. Typically, there are four systems design tasks for in-house development.
1) The first task is to specify (1), which defines the technologies to be used by one, more , or all information systems in terms of their data, process, interfaces, and network components. This task is accomplished by analyzing the data models and process models that are initially created during requirements analysis.
2) The next systems design task is to develop the (2). The purpose of this task is to prepare technical design specifications for a database that will be adaptable to future requirements and expansion.
3) Once the database prototype has been built, the systems designer can work closely with system users to develop input, output and dialogue specifications. The (3) must be specified to ensure that the outputs are not lost, misrouted, misused, or incomplete.
4) The fourth design task involves packaging all the specifications from the previous design tasks into a set of specifications that will guide the (4) activities during the following phases of the systems development methodology.
Finally, we should (5) and update the project plan accordingly. The key deliverable should include a detailed plan for the construction phase that should follow.
(1)A. an application architecture
B. a distributed system
C. a system scope
D. a system physical model
(2)A. database design specifications
B. database organization decisions
C. data structure specifications
D. data distribution decisions
(3)A. format and layout
B. transaction details
C. additional instructions
D. internal controls
(4)A. system administrator’s
B. system analyst’s
C. computer programmer’s
D. system designer’s
(5)A. adjust the project schedule
B. reevaluate project feasibility
C. evaluate vendor proposals
D. select the best vendor proposal
试题解析与讨论:
www.cnitpm.com/st/1301828054.html试题参考答案:C、A、B、D、B
试题
10:
如果管理距离为15,则( )。
A.这是一条静态路由
B.这是一台直连设备
C.该路由信息比较可靠
D.该路由代价较小
试题解析与讨论:
www.cnitpm.com/st/286803763.html试题参考答案:C