信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2021/12/21)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2021/12/21
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2021/12/21)
試題
1: 密碼分析者針對加解密算法的數(shù)學(xué)基礎(chǔ)和某些密碼學(xué)特性,根據(jù)數(shù)學(xué)方法破譯密碼的攻擊方式稱為( )。
A.數(shù)學(xué)分析攻擊
B.差分分析攻擊
C.基于物理的攻擊
D.窮舉攻擊
試題解析與討論:
m.xiexiliangjiufa.com/st/3892725663.html試題參考答案:A
試題
2: 如果對一個(gè)密碼體制的破譯依賴于對某一個(gè)經(jīng)過深入研究的數(shù)學(xué)難題的解決,就認(rèn)為相應(yīng)的密碼體制是( )的。
A.計(jì)算安全
B.可證明安全
C.無條件安全
D.絕對安全
試題解析與討論:
m.xiexiliangjiufa.com/st/411494857.html試題參考答案:B
試題
3: 包過濾技術(shù)防火墻在過濾數(shù)據(jù)包時(shí),一般不關(guān)心( )。
A.數(shù)據(jù)包的源地址
B.數(shù)據(jù)包的目的地址
C.數(shù)據(jù)包的協(xié)議類型
D.數(shù)據(jù)包的內(nèi)容
試題解析與討論:
m.xiexiliangjiufa.com/st/4112327023.html試題參考答案:D
試題
4: ( )攻擊是指借助于客戶機(jī)/服務(wù)器技術(shù),將多個(gè)計(jì)算機(jī)聯(lián)合起來作為攻擊平臺(tái),對一個(gè)或多個(gè)目標(biāo)發(fā)動(dòng)DoS攻擊,從而成倍地提高拒絕服務(wù)攻擊的威力。
A.緩沖區(qū)溢出
B.分布式拒絕服務(wù)
C.拒絕服務(wù)
D. 口令
試題解析與討論:
m.xiexiliangjiufa.com/st/4114823197.html試題參考答案:B
試題
5: 電子郵件已經(jīng)成為傳播惡意代碼的重途徑之一,為了有效防止電子郵件中的惡意代碼,應(yīng)該用( )的方式閱讀電子郵件。
A.應(yīng)用軟件
B.純文本
C.網(wǎng)頁
D.在線
試題解析與討論:
m.xiexiliangjiufa.com/st/3894812738.html試題參考答案:B
試題
6: 入侵檢測技術(shù)包括異常入侵檢測和誤用入侵檢測。以下關(guān)于誤用檢測技術(shù)的描述中,正確的是( )。
A.誤用檢測根據(jù)對用戶正常行為的了解和掌握來識(shí)別入侵行為
B.誤用檢測根據(jù)掌握的關(guān)于入侵或攻擊的知識(shí)來識(shí)別入侵行為
C.誤用檢測不需要建立入侵或攻擊的行為特征庫
D.誤用檢測需要建立用戶的正常行為特征輪廓
試題解析與討論:
m.xiexiliangjiufa.com/st/4112521300.html試題參考答案:B
試題
7: 設(shè)在RSA的公鑰密碼體制中,用于為(e,n)=(7,55),則私鑰d=()。
A. 8
B. 13
C. 23
D. 37
試題解析與討論:
m.xiexiliangjiufa.com/st/327521419.html試題參考答案:C
試題
8: 深度流檢測技術(shù)是一種主要通過判斷網(wǎng)絡(luò)流是否異常來進(jìn)行安全防護(hù)的網(wǎng)絡(luò)安全技術(shù),深度流檢測系統(tǒng)通常不包括( )。
A.流特征提取單元
B.流特征選擇單元
C.分類器
D.響應(yīng)單元
試題解析與討論:
m.xiexiliangjiufa.com/st/389673923.html試題參考答案:D
試題
9:
有一種攻擊是不斷對網(wǎng)絡(luò)服務(wù)系統(tǒng)進(jìn)行干擾,改變其正常的作業(yè)流程,執(zhí)行無關(guān)程序使系統(tǒng)響應(yīng)減慢甚至癱瘓。這種攻擊叫做()
A、重放攻擊
B、拒絕服務(wù)攻擊
C、反射攻擊
D、服務(wù)攻擊
試題解析與討論:
m.xiexiliangjiufa.com/st/2846424079.html試題參考答案:B
試題
10: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisions
B.image
C.preimage
D.solution
試題解析與討論:
m.xiexiliangjiufa.com/st/4115223167.html試題參考答案:A、D、C、B、A