信管网每日一练

导航

信息安全工程师每日一练试题(2020/6/3)

2020年06月04日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/6/3)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/3

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/6/3)

试题1: Change management procedures are established by IS management to: 
A、control the movement of applications from the test environment to the production environment. 
B、control the interruption of business operations from lack of attention to unresolved problems. 
C、ensure the uninterrupted operation of the business in the event of a disaster. 
D、verify that system changes are properly documented. 
试题解析与讨论:www.cnitpm.com/st/2961414608.html
试题参考答案:A

试题2: An IS auditor was hired to review e-business security. The IS auditor's first task was to examine each existing e-business application looking for vulnerabilities. What would be the next task? 
A、Report the risks to the CIO and CEO immediately 
B、Examine e-business application in development 
C、Identify threats and likelihood of occurrence 
D、Check the budget available for risk management 
试题解析与讨论:www.cnitpm.com/st/2931627428.html
试题参考答案:C

试题3

以下哪些是需要在信息安全策略中进行描述的:()
A.组织信息系统安全架构
B.信息安全工作的基本原则
C.组织信息安全技术参数
D.组织信息安全实施手段

试题解析与讨论:www.cnitpm.com/st/2564829145.html
试题参考答案:B

试题4: A benefit of open system architecture is that it: ()
A、facilitates interoperability. 
B、facilitates the integration of proprietary components. 
C、will be a basis for volume discounts from equipment vendors. 
D、allows for the achievement of more economies of scale for equipment. 

试题解析与讨论:www.cnitpm.com/st/2915622357.html
试题参考答案:A

试题5: The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure: 
A、integrity. 
B、authenticity. 
C、authorization. 
D、nonrepudiation. 
试题解析与讨论:www.cnitpm.com/st/2933117599.html
试题参考答案:A

试题6: Which of the following satisfies a two-factor user authentication? 
A、Iris scanning plus fingerprint scanning 
B、Terminal ID plus global positioning system (GPS) 
C、A smart card requiring the user's PIN 
D、User ID along with password 
试题解析与讨论:www.cnitpm.com/st/294015551.html
试题参考答案:C

试题7

下列安全协议中,()可用于安全电子邮件加密。
A.PGP
B.SET
C.SSL
D.TLS

试题解析与讨论:www.cnitpm.com/st/2710425242.html
试题参考答案:A

试题8: Which of the following recovery strategies is MOST appropriate for a business having multiple offices within a region and a limited recovery budget? 
A、A hot site maintained by the business 
B、A commercial cold site 
C、A reciprocal arrangement between its offices 
D、A third-party hot site 
试题解析与讨论:www.cnitpm.com/st/298641295.html
试题参考答案:C

试题9

下面哪一个工具不支持漏洞扫描()
A、BT5
B、NMAP
C、wireshahe
D、nessus

试题解析与讨论:www.cnitpm.com/st/272816553.html
试题参考答案:C

试题10

账号锁定策略中对超过一定次数的错误登录账号进行锁定是为了对抗以下哪种攻击?()
A.分布式拒绝服务攻击(DDoS)
B.病毒传染
C.口令暴力破解
D.缓冲区溢出攻击

试题解析与讨论:www.cnitpm.com/st/2562623997.html
试题参考答案:C

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载