信息安全工程師當(dāng)天每日一練試題地址:http://m.ichunya.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://m.ichunya.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/5/25)在線測(cè)試:http://m.ichunya.com/exam/ExamDay.aspx?t1=6&day=2017/5/25
信息安全工程師每日一練試題內(nèi)容(2017/5/25)
試題
1:
數(shù)字簽名功能不包括 ( ) 。
A、防止發(fā)送方的抵賴行為
B、發(fā)送方身份確認(rèn)
C、接收方身份確認(rèn)
D、保證數(shù)據(jù)的完整性
試題解析與討論:
http://m.ichunya.com/st/89013065.html試題參考答案:C
試題
2: 下面哪一項(xiàng)不是VPN協(xié)議標(biāo)準(zhǔn):()
A、L2TP
B、ipsec
C、TACACS+
D、PPTP
試題解析與討論:
http://m.ichunya.com/st/2170811508.html試題參考答案:C
試題
3: 關(guān)于TCP 和UDP 協(xié)議區(qū)別的描述中,哪句話是錯(cuò)誤的?()
A、TCP協(xié)議是面向連接的,而UDP是無(wú)連接的
B、UDP 協(xié)議要求對(duì)發(fā)出據(jù)的每個(gè)數(shù)據(jù)包都要確認(rèn)
C、TCP 協(xié)議可靠性高,UDP則需要應(yīng)用層保證數(shù)據(jù)傳輸?shù)目煽啃?br />D、UDP 協(xié)議比TCP 協(xié)議的安全性差
試題解析與討論:
http://m.ichunya.com/st/2404429427.html試題參考答案:B
試題
4:
以下哪種為丟棄廢舊磁帶前的最佳處理方式?()
A.復(fù)寫磁帶
B.初始化磁帶卷標(biāo)
C.對(duì)磁帶進(jìn)行消磁
D.刪除磁帶
試題解析與討論:
http://m.ichunya.com/st/2615321932.html試題參考答案:C
試題
5:
下面哪一項(xiàng)是黑客用來(lái)實(shí)施DDOS攻擊的工具:()
A、LC5
B、Rootkit
C、Icesword
D、Trinoo
試題解析與討論:
http://m.ichunya.com/st/26447995.html試題參考答案:D
試題
6:
以下關(guān)于加密技術(shù)的敘述中,錯(cuò)誤的是()
A、對(duì)稱密碼體制的加密密鑰和解密密鑰是相同的
B、密碼分析的目的就是千方百計(jì)地尋找密鑰或明文
C、對(duì)稱密碼體制中加密算法和解密算法是保密的
D、所有的密鑰都有生存周期
試題解析與討論:
http://m.ichunya.com/st/28472951.html試題參考答案:C
試題
7: Which of the following is the BEST performance criterion for evaluating the adequacy of an organization's security awareness training?
A、Senior management is aware of critical information assets and demonstrates an adequate concern for their protection.
B、Job descriptions contain clear statements of accountability for information security.
C、In accordance with the degree of risk and business impact, there is adequate funding for security efforts.
D、No actual incidents have occurred that have caused a loss or a public embarrassment.
試題解析與討論:
http://m.ichunya.com/st/2930712760.html試題參考答案:B
試題
8: Which of the following is the BEST practice to ensure that access authorizations are still valid?
A、Information owner provides authorization for users to gain access
B、Identity management is integrated with human resource processes
C、Information owners periodically review the access controls
D、An authorization matrix is used to establish validity of access
試題解析與討論:
http://m.ichunya.com/st/293868905.html試題參考答案:B
試題
9: 以下哪點(diǎn)是設(shè)施完整性測(cè)試(ITF)的優(yōu)點(diǎn)()
A. 使用了測(cè)試數(shù)據(jù)以至于信息系統(tǒng)審計(jì)師無(wú)需檢查交易來(lái)源
B. 定期測(cè)試無(wú)需分離測(cè)試流程
C. 測(cè)試了應(yīng)用系統(tǒng)的有效性以及正在運(yùn)行的數(shù)據(jù)
D. 需要?jiǎng)h除測(cè)試數(shù)據(jù)
試題解析與討論:
http://m.ichunya.com/st/3019215562.html試題參考答案:B
試題
10: 下列哪項(xiàng)為電子商務(wù)事務(wù)處理提供認(rèn)可()
A.公鑰基礎(chǔ)
B.數(shù)據(jù)加密標(biāo)準(zhǔn)
C.信息 證實(shí)代碼
D.個(gè)人鑒定碼
試題解析與討論:
http://m.ichunya.com/st/3021812949.html試題參考答案:A