信管网每日一练

导航

信息安全工程师每日一练试题(2020/4/28)

2020年04月29日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/4/28)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/4/28

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/4/28)

试题1: Which of the following is a control over component communication failure/errors? 
A、Restricting operator access and maintaining audit trails 
B、Monitoring and reviewing system engineering activity 
C、Providing network redundancy 
D、Establishing physical barriers to the data transmitted over the network 
试题解析与讨论:www.cnitpm.com/st/2918316155.html
试题参考答案:C

试题2: In determining the acceptable time period for the resumption of critical business processes: 
A、only downtime costs need to be considered. 
B、recovery operations should be analyzed. 
C、both downtime costs and recovery costs need to be evaluated. 
D、indirect downtime costs should be ignored. 
试题解析与讨论:www.cnitpm.com/st/296309779.html
试题参考答案:C

试题3

微信收到“微信团队”的安全提示:“您的微信账号在16:46尝试在另一个设备登录。登录设备:XX品牌XX型号”。这时我们应该怎么做( )
A、 有可能是误报,不用理睬
B、 确认是否是自己的设备登录,如果不是,则尽快修改密码
C、 自己的密码足够复杂,不可能被破解,坚决不修改密码
D、 拨打110报警,让警察来解决

试题解析与讨论:www.cnitpm.com/st/266515142.html
试题参考答案:B

试题4

下列哪个是蠕虫的特性?()
A.不感染、依附性
B.不感染、独立性
C.可感染、依附性
D.可感染、独立性

试题解析与讨论:www.cnitpm.com/st/27052869.html
试题参考答案:D

试题5

简单包过滤防火墙主要工作在()
A、链路层/网络层
B、网络层/传输层
C、应用层
D、会话层

试题解析与讨论:www.cnitpm.com/st/273451894.html
试题参考答案:B

试题6: The PRIMARY objective of service-level management (SLM) is to: 
A、define, agree, record and manage the required levels of service. 
B、ensure that services are managed to deliver the highest achievable level of availability. 
C、keep the costs associated with any service at a minimum. 
D、monitor and report any legal noncompliance to business management. 
试题解析与讨论:www.cnitpm.com/st/295808213.html
试题参考答案:A

试题7: Which of the following is the MOST effective method for dealing with the spreading of a network worm that exploits vulnerability in a protocol? 
A、Install the vendor's security fix for the vulnerability. 
B、Block the protocol traffic in the perimeter firewall. 
C、Block the protocol traffic between internal network segments. 
D、Stop the service until an appropriate security fix is installed. 
试题解析与讨论:www.cnitpm.com/st/2962223504.html
试题参考答案:D

试题8

某公司在执行灾难恢复测试时.信息安全专业人员注意到灾难恢复站点的服务器的运行速度缓慢,为了找到根本愿因,他应该首先检查:()
A.灾难恢复站点的错误事件报告
B.灾难恢复测试计划
C.灾难恢复计划(DRP)
D.主站点和灾难恢复站点的配置文件

试题解析与讨论:www.cnitpm.com/st/2566622626.html
试题参考答案:D

试题9: 信息隐藏主要研究如何将机密信息秘密隐藏于另一公开的信息中。以下关于利用多媒体数据来隐藏机密信息的叙述中,错误的是()。
A.多媒体信息本身有很大的冗余性
B.多媒体信息本身编码效率很高
C.人眼或人耳对某些信息由一定的掩蔽效应
D.信息嵌入到多媒体信息中不影响多媒体本身的传送和使用
试题解析与讨论:www.cnitpm.com/st/3274529101.html
试题参考答案:B

试题10: Which of the following should be considered FIRST when implementing a risk management program? 
A、An understanding of the organization's threat, vulnerability and risk profile 
B、An understanding of the risk exposures and the potential consequences of compromise 
C、A determination of risk management priorities based on potential consequences 
D、A risk mitigation strategy sufficient to keep risk consequences at an acceptable level 
试题解析与讨论:www.cnitpm.com/st/298272626.html
试题参考答案:A

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载