信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/11/23)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/11/23
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/11/23)
试题
1: 一个密码系统如果用E表示加密运算,D表示解密运算,M表示明文,C表示密文,则下面描述必然成立的是( )。
A. E(E(M))=C
B. D(E(M))=M
C. D(E(M))=C
D. D(D(M))=M
试题解析与讨论:
www.cnitpm.com/st/389293064.html试题参考答案:B
试题
2: 按照密码系统对明文的处理方法,密码系统可以分为( )。
A.对称密码系统和公钥密码系统
B.对称密码系统和非对称密码系统
C.数据加密系统和数字签名系统
D.分组密码系统和序列密码系统
试题解析与讨论:
www.cnitpm.com/st/3893815370.html试题参考答案:D
试题
3:
下列哪一项能够提高网络的可用性?()
A.数据冗余
B.链路冗余
C.软件冗余
D.电源冗余
试题解析与讨论:
www.cnitpm.com/st/260678648.html试题参考答案:B
试题
4: 对日志数据进行审计检查,属于()类控制措施。
A.预防
B.检查
C.威慑
D.修正
试题解析与讨论:
www.cnitpm.com/st/3270715804.html试题参考答案:B
试题
5: 密码分析者针对加解密算法的数学基础和某些密码学特性,根据数学方法破译密码的攻击方式称为( )。
A.数学分析攻击
B.差分分析攻击
C.基于物理的攻击
D.穷举攻击
试题解析与讨论:
www.cnitpm.com/st/3892725663.html试题参考答案:A
试题
6: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
试题解析与讨论:
www.cnitpm.com/st/32757467.html试题参考答案:C、B、C、D、A
试题
7:
射频识别(RFID)标签容易受到以下哪种风险?()
A.进程劫持
B.窃听
C.恶意代码
D.Phishing
试题解析与讨论:
www.cnitpm.com/st/2609025800.html试题参考答案:B
试题
8:
以下有关信息安全管理员职责的叙述,不正确的是()
A、信息安全管理员应该对网络的总体安全布局进行规划
B、信息安全管理员应该对信息系统安全事件进行处理
C、信息安全管理员应该负责为用户编写安全应用程序
D、信息安全管理员应该对安全设备进行优化配置
试题解析与讨论:
www.cnitpm.com/st/2844417488.html试题参考答案:C
试题
9: SM4是一种分组密码算法,其分组长度和密钥长度分别为()。
A.64位和128位
B.128位和128位
C.128位和256位
D.256位和256位
试题解析与讨论:
www.cnitpm.com/st/3275126410.html试题参考答案:B
试题
10:
数字签名最常见的实现方法是建立在()的组合基础之上
A、公钥密码体制和对称密码体制
B、对称密码体制和MD5摘要算法
C、公钥密码体制和单向安全散列函数算法
D、公证系统和MD4摘要算法
试题解析与讨论:
www.cnitpm.com/st/2845924106.html试题参考答案:C