信管网每日一练

导航

信息安全工程师每日一练试题(2020/6/18)

2020年06月19日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/6/18)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/18

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/6/18)

试题1: A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity? 
A、Comparing source code 
B、Reviewing system log files 
C、Comparing object code 
D、Reviewing executable and source code integrity 
试题解析与讨论:www.cnitpm.com/st/2957425693.html
试题参考答案:B

试题2

电子邮件客户端通常需要用()协议来发送邮件。
A.仅SMTP
B.仅POP
C.SMTP 和POP
D.以上都不正确

试题解析与讨论:www.cnitpm.com/st/2682923626.html
试题参考答案:A

试题3: 对于定义在GF(p)上的椭圆曲线,取素数P=11,椭圆曲线y2=x3+x+6mod11,则以下是椭圆曲线11平方剩余的是(  )。
A.x=1
B.x=3
C.x=6
D.x=9
试题解析与讨论:www.cnitpm.com/st/3898520398.html
试题参考答案:B

试题4: Functionality is a characteristic associated with evaluating the quality of software products throughout their life cycle, and is BEST described as the set of attributes that bear on the: 
A、existence of a set of functions and their specified properties. 
B、ability of the software to be transferred from one environment to another. 
C、capability of software to maintain its level of performance under stated conditions. 
D、relationship between the performance of the software and the amount of resources used. 
试题解析与讨论:www.cnitpm.com/st/292326558.html
试题参考答案:A

试题5: In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model? 
A、Optimized 
B、Managed 
C、Defined 
D、Repeatable 
试题解析与讨论:www.cnitpm.com/st/292603206.html
试题参考答案:B

试题6: 密码体制是一种代表性的古典密码算法,在凯撒密码体制中,设置密钥参数k = 3,
依次对密文“zhonggguo”进行加密,则相应的密文为()
A.ckrqjjxr
B.cdrqjjxr
C.Akrqjjxr
D.Ckrqiixr试题解析与讨论:www.cnitpm.com/st/3269123998.html
试题参考答案:A

试题7: Integrating business continuity planning (BCP) into an IT project aids in: 
A、the retrofitting of the business continuity requirements. 
B、the development of a more comprehensive set of requirements. 
C、the development of a transaction flowchart. 
D、ensuring the application meets the user's needs. 
试题解析与讨论:www.cnitpm.com/st/297596764.html
试题参考答案:B

试题8

基本的计算机安全需求不包括下列哪一条:()
A.安全策略和标识
B.绝对的保证和持续的保护
C. 身份鉴别和落实责任
D. 合理的保证和连续的保护

试题解析与讨论:www.cnitpm.com/st/2588428880.html
试题参考答案:B

试题9

若 Bob 给 Alice 发送一封邮件,并想让 Alice 确信邮件是由 Bob 发出的,则 Bob 应该选用()对邮件加密。
A.Alice 的公钥      
B.Alice 的私钥        
C.Bob 的公钥        
D.Bob 的私钥

试题解析与讨论:www.cnitpm.com/st/2557019090.html
试题参考答案:D

试题10: 在DES加密算法中,子密钥的长度和加密分组的长度分别是(  )。
A.56位和64位
B.48位和64位
C.48位和56位
D.64位和64位
试题解析与讨论:www.cnitpm.com/st/3895821970.html
试题参考答案:B

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载