信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/10/18)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/10/18
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/10/18)
试题
1: Which of the following is the MOST effective type of antivirus software?
A、Scanners
B、Active monitors
C、Integrity checkers
D、Vaccines
试题解析与讨论:
www.cnitpm.com/st/2963423445.html试题参考答案:C
试题
2:
关于《计算机信息系统安全保护条例》,以下错误的是:()
A、计算机信息系统实行安全等级保护制度。
B、计算机信息系统使用单位应当建立健全安全管理制度。
C、计算机信息系统实行性能测试和安全测评制度。
D、公安部主管全国计算机信息系统安全保护工作(含安全监督职权)。
试题解析与讨论:
www.cnitpm.com/st/2734412467.html试题参考答案:C
试题
3: When segregation of duties concerns exist between IT support staff and end users, what would be a suitable compensating control?
A、Restricting physical access to computing equipment
B、Reviewing transaction and application logs
C、Performing background checks prior to hiring IT staff
D、Locking user sessions after a specified period of inactivity
试题解析与讨论:
www.cnitpm.com/st/2955015870.html试题参考答案:B
试题
4:
某种防火墙的缺点是没有办法从非常细微之处来分析数据包,但它的优点是非常快,这种防火墙是以下的哪一种?()
A.电路级网关
B.应用级网关
C.会话层防火墙
D.包过滤防火墙
试题解析与讨论:
www.cnitpm.com/st/2705614956.html试题参考答案:D
试题
5:
以下哪些不属于脆弱性范畴?()
A.黑客攻击
B.操作系统漏洞
C.应用程序BUG
D.人员的不良操作习惯
试题解析与讨论:
www.cnitpm.com/st/2590929496.html试题参考答案:A
试题
6: 以下密码使用方法中正确的是()。
A、将密码记录在日记本上以避免忘记
B、任何情况下均不得使用临时性密码
C、密码中的字母不得重复
D、不要使用全部由字母组成的密码
试题解析与讨论:
www.cnitpm.com/st/2267418787.html试题参考答案:D
试题
7:
某个客户的网络现在可以正常访问Internet 互联网,共有200台终端PC但此客户从ISP(互联网络服务提供商)里只获得了16个公有的IPv4地址,最多也只有16台PC可以访问互联网,要想让全部200 台终端PC访问Internet互联网最好采取什么方法或技术:()
A.花更多的钱向ISP申请更多的IP地址
B.在网络的出口路由器上做源NAT
C.在网络的出口路由器上做目的NAT
D.在网络的出口处增加一定数量的路由器
试题解析与讨论:
www.cnitpm.com/st/2681423341.html试题参考答案:B
试题
8: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisons
B.image
C.preimage
D.solution
试题解析与讨论:
www.cnitpm.com/st/4115223167.html试题参考答案:A、D、C、B、C
试题
9: 数字签名比较的是摘要结果长度是否都是128位的()
A、是
B、否
试题解析与讨论:
www.cnitpm.com/st/243452276.html试题参考答案:B
试题
10:
防火墙作为一种被广泛使用的网络安全防御技术,其自身有一些限制,它不能阻止()
A、内部威胁和病毒威胁
B、外部攻击
C、外部攻击、外部威胁和病毒威胁
D、外部攻击和外部威胁
试题解析与讨论:
www.cnitpm.com/st/2845123602.html试题参考答案:A