信管网每日一练

导航

信息安全工程师每日一练试题(2020/6/5)

2020年06月06日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/6/5)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/5

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/6/5)

试题1: Which of the following would an IS auditor consider to be the MOST important to review when conducting a business continuity audit? 
A、A hot site is contracted for and available as needed. 
B、A business continuity manual is available and current. 
C、Insurance coverage is adequate and premiums are current. 
D、Media backups are performed on a timely basis and stored offsite. 
试题解析与讨论:www.cnitpm.com/st/2950028055.html
试题参考答案:D

试题2: Which of the following is a network diagnostic tool that monitors and records network information? 
A、Online monitor 
B、Downtime report 
C、Help desk report 
D、Protocol analyzer 
试题解析与讨论:www.cnitpm.com/st/2932821084.html
试题参考答案:D

试题3: In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should: 
A、identify and assess the risk assessment process used by management. 
B、identify information assets and the underlying systems. 
C、disclose the threats and impacts to management. 
D、identify and evaluate the existing controls. 
试题解析与讨论:www.cnitpm.com/st/2951027327.html
试题参考答案:D

试题4: Which of the following functions should be performed by the application owners to ensure an adequate segregation of duties between IS and end users? 
A、System analysis 
B、Authorization of access to data 
C、Application programming 
D、Data administration 
试题解析与讨论:www.cnitpm.com/st/2958812980.html
试题参考答案:B

试题5: Which of the following is the MOST reasonable option for recovering a noncritical system? 
A、Warm site 
B、Mobile site 
C、Hot site 
D、Cold site 
试题解析与讨论:www.cnitpm.com/st/2924915346.html
试题参考答案:D

试题6: An organization currently using tape backups takes one full backup weekly and incremental backups daily. They recently augmented their tape backup procedures with a backup-to-disk solution. This is appropriate because: 
A、fast synthetic backups for offsite storage are supported. 
B、backup to disk is always significantly faster than backup to tape. 
C、tape libraries are no longer needed. 
D、data storage on disks is more reliable than on tapes. 
试题解析与讨论:www.cnitpm.com/st/2933910522.html
试题参考答案:A

试题7

下列哪一种防病毒软件的实施策略在内部公司网络中是最有效的:()
A.   服务器防毒软件
B.病毒墙
C. 工作站防病毒软件
D. 病毒库及时更新

试题解析与讨论:www.cnitpm.com/st/2587722546.html
试题参考答案:D

试题8: 2017年6月1日,()开始施行。
A.中华人民共和国计算机信息系统安全保护条例
B.计算机信息系统国际联网保密管理规定
C.中华人民共和国网络安全法
D.中华人民共和国电子签名法
试题解析与讨论:www.cnitpm.com/st/32754695.html
试题参考答案:C

试题9: Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card? 
A、Intrusion detection systems 
B、Data mining techniques 
C、Firewalls 
D、Packet filtering routers 
试题解析与讨论:www.cnitpm.com/st/2941317904.html
试题参考答案:B

试题10

RSA 与DES相比的优点是:()
A、它可以提供数字签名和加密功能
B、由于使用对称密钥它使用的资源少加密速度快
C、前者是分组加密后者是流加密
D、它使用一次性加密本

试题解析与讨论:www.cnitpm.com/st/2739411722.html
试题参考答案:A

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载