信管网每日一练

导航

信息安全工程师每日一练试题(2020/10/18)

2020年10月19日来源:信管网 作者:cnitpm

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/10/18)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/10/18

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/10/18)

试题1: Which of the following is the MOST effective type of antivirus software? 
A、Scanners 
B、Active monitors 
C、Integrity checkers 
D、Vaccines 
试题解析与讨论:www.cnitpm.com/st/2963423445.html
试题参考答案:C

试题2

关于《计算机信息系统安全保护条例》,以下错误的是:()
A、计算机信息系统实行安全等级保护制度。
B、计算机信息系统使用单位应当建立健全安全管理制度。
C、计算机信息系统实行性能测试和安全测评制度。
D、公安部主管全国计算机信息系统安全保护工作(含安全监督职权)。

试题解析与讨论:www.cnitpm.com/st/2734412467.html
试题参考答案:C

试题3: When segregation of duties concerns exist between IT support staff and end users, what would be a suitable compensating control? 
A、Restricting physical access to computing equipment 
B、Reviewing transaction and application logs 
C、Performing background checks prior to hiring IT staff 
D、Locking user sessions after a specified period of inactivity 
试题解析与讨论:www.cnitpm.com/st/2955015870.html
试题参考答案:B

试题4

某种防火墙的缺点是没有办法从非常细微之处来分析数据包,但它的优点是非常快,这种防火墙是以下的哪一种?()
A.电路级网关
B.应用级网关
C.会话层防火墙
D.包过滤防火墙

试题解析与讨论:www.cnitpm.com/st/2705614956.html
试题参考答案:D

试题5

以下哪些不属于脆弱性范畴?()
A.黑客攻击
B.操作系统漏洞
C.应用程序BUG
D.人员的不良操作习惯

试题解析与讨论:www.cnitpm.com/st/2590929496.html
试题参考答案:A

试题6: 以下密码使用方法中正确的是()。
A、将密码记录在日记本上以避免忘记    
B、任何情况下均不得使用临时性密码    
C、密码中的字母不得重复    
D、不要使用全部由字母组成的密码
试题解析与讨论:www.cnitpm.com/st/2267418787.html
试题参考答案:D

试题7

某个客户的网络现在可以正常访问Internet 互联网,共有200台终端PC但此客户从ISP(互联网络服务提供商)里只获得了16个公有的IPv4地址,最多也只有16台PC可以访问互联网,要想让全部200 台终端PC访问Internet互联网最好采取什么方法或技术:()
A.花更多的钱向ISP申请更多的IP地址
B.在网络的出口路由器上做源NAT
C.在网络的出口路由器上做目的NAT
D.在网络的出口处增加一定数量的路由器

试题解析与讨论:www.cnitpm.com/st/2681423341.html
试题参考答案:B

试题8: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisons
B.image
C.preimage
D.solution
试题解析与讨论:www.cnitpm.com/st/4115223167.html
试题参考答案:A、D、C、B、C

试题9: 数字签名比较的是摘要结果长度是否都是128位的()
A、是
B、否
试题解析与讨论:www.cnitpm.com/st/243452276.html
试题参考答案:B

试题10

防火墙作为一种被广泛使用的网络安全防御技术,其自身有一些限制,它不能阻止()
A、内部威胁和病毒威胁
B、外部攻击
C、外部攻击、外部威胁和病毒威胁
D、外部攻击和外部威胁

试题解析与讨论:www.cnitpm.com/st/2845123602.html
试题参考答案:A

温馨提示:因考试政策、内容不断变化与调整,信管网提供的以上信息仅供参考,如有异议,请考生以权威部门公布的内容为准!

分享至:
请使用浏览器的分享功能,把好文章分享给更多的人

信管网 - 信息系统项目管理专业网站

下载APP-在线学习

培训课程

0元畅享

考试题库

免费资料

APP下载