信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/6/5)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/5
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/6/5)
试题
1: Which of the following would an IS auditor consider to be the MOST important to review when conducting a business continuity audit?
A、A hot site is contracted for and available as needed.
B、A business continuity manual is available and current.
C、Insurance coverage is adequate and premiums are current.
D、Media backups are performed on a timely basis and stored offsite.
试题解析与讨论:
www.cnitpm.com/st/2950028055.html试题参考答案:D
试题
2: Which of the following is a network diagnostic tool that monitors and records network information?
A、Online monitor
B、Downtime report
C、Help desk report
D、Protocol analyzer
试题解析与讨论:
www.cnitpm.com/st/2932821084.html试题参考答案:D
试题
3: In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should:
A、identify and assess the risk assessment process used by management.
B、identify information assets and the underlying systems.
C、disclose the threats and impacts to management.
D、identify and evaluate the existing controls.
试题解析与讨论:
www.cnitpm.com/st/2951027327.html试题参考答案:D
试题
4: Which of the following functions should be performed by the application owners to ensure an adequate segregation of duties between IS and end users?
A、System analysis
B、Authorization of access to data
C、Application programming
D、Data administration
试题解析与讨论:
www.cnitpm.com/st/2958812980.html试题参考答案:B
试题
5: Which of the following is the MOST reasonable option for recovering a noncritical system?
A、Warm site
B、Mobile site
C、Hot site
D、Cold site
试题解析与讨论:
www.cnitpm.com/st/2924915346.html试题参考答案:D
试题
6: An organization currently using tape backups takes one full backup weekly and incremental backups daily. They recently augmented their tape backup procedures with a backup-to-disk solution. This is appropriate because:
A、fast synthetic backups for offsite storage are supported.
B、backup to disk is always significantly faster than backup to tape.
C、tape libraries are no longer needed.
D、data storage on disks is more reliable than on tapes.
试题解析与讨论:
www.cnitpm.com/st/2933910522.html试题参考答案:A
试题
7:
下列哪一种防病毒软件的实施策略在内部公司网络中是最有效的:()
A. 服务器防毒软件
B.病毒墙
C. 工作站防病毒软件
D. 病毒库及时更新
试题解析与讨论:
www.cnitpm.com/st/2587722546.html试题参考答案:D
试题
8: 2017年6月1日,()开始施行。
A.中华人民共和国计算机信息系统安全保护条例
B.计算机信息系统国际联网保密管理规定
C.中华人民共和国网络安全法
D.中华人民共和国电子签名法
试题解析与讨论:
www.cnitpm.com/st/32754695.html试题参考答案:C
试题
9: Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
A、Intrusion detection systems
B、Data mining techniques
C、Firewalls
D、Packet filtering routers
试题解析与讨论:
www.cnitpm.com/st/2941317904.html试题参考答案:B
试题
10:
RSA 与DES相比的优点是:()
A、它可以提供数字签名和加密功能
B、由于使用对称密钥它使用的资源少加密速度快
C、前者是分组加密后者是流加密
D、它使用一次性加密本
试题解析与讨论:
www.cnitpm.com/st/2739411722.html试题参考答案:A