信息安全工程師當天每日一練試題地址:www.xcpkj.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.xcpkj.com/class/27/e6_1.html
信息安全工程師每日一練試題(2022/7/1)在線測試:www.xcpkj.com/exam/ExamDay.aspx?t1=6&day=2022/7/1
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2022/7/1)
試題1
The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.查看答案
試題參考答案:A、D、C、B、A
試題解析與討論:www.xcpkj.com/st/4115223167.html
試題2
通用入侵檢測框架模型(CIDF)由事件產生器、事件分析器、響應單元和事件數據庫四個部分組成。其中向系統(tǒng)其他部分提供事件的是( )查看答案
試題參考答案:A
試題解析與討論:www.xcpkj.com/st/5226223863.html
試題3
網絡安全漏洞是網絡安全管理工作的重要內容,網絡信息系統(tǒng)的漏洞主要來自兩個方面:非技術性安全漏洞和技術性安全漏洞。以下屬于非技術性安全漏洞主要來源的是 ( )查看答案
試題參考答案:C
試題解析與討論:www.xcpkj.com/st/522697983.html
試題4
入侵檢測技術包括異常入侵檢測和誤用入侵檢測。以下關于誤用檢測技術的描述中,正確的是( )。查看答案
試題參考答案:B
試題解析與討論:www.xcpkj.com/st/4112521300.html
試題5
惡意代碼是指為達到惡意目的而專門設計的程序或代碼。以下惡意代碼中,屬于腳本病毒的是 ( )。查看答案
試題參考答案:D
試題解析與討論:www.xcpkj.com/st/4110512003.html
試題6
SYN 掃描首先向目標主機發(fā)送連接請求,當目標主機返回響應后,立即切斷連接過程, 并查看響應情況。果目標主機返回( ),表示目標主機的該端口開放。查看答案
試題參考答案:A
試題解析與討論:www.xcpkj.com/st/5223223655.html
試題7
能有效控制內部網絡和外部網絡之間的訪問及數據傳輸,從而達到保護內部網絡的信息不受外部非授權用戶的訪問和對不良信息的過濾的安全技術是()查看答案
試題參考答案:C
試題解析與討論:www.xcpkj.com/st/327375395.html
試題8
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
試題參考答案:D、C、A、B、A
試題解析與討論:www.xcpkj.com/st/389944612.html
試題9
以下對OSI(開放系統(tǒng)互聯(lián))參考模型中數據鏈路層的功能敘述中,描述最貼切是()
A、保證數據正確的順序、無差錯和完整
B、控制報文通過網絡的路由選擇
C、提供用戶與網絡的接口
D、處理信號通過介質的傳輸
查看答案
試題參考答案:A
試題解析與討論:www.xcpkj.com/st/2848820346.html
試題10
IP地址欺騙的發(fā)生過程,下列順序正確的是()。①確定要攻擊的主機A;②發(fā)現和他有信任關系的主機B;③猜測序列號;④成功連接,留下后面;⑤將B利用某種方法攻擊癱瘓。查看答案
試題參考答案:A
試題解析與討論:www.xcpkj.com/st/3273328170.html
溫馨提示:因考試政策、內容不斷變化與調整,信管網網站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!
信管網致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網軟考課程由信管網依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |