女人久久久www免费人成看片,国内自拍偷拍网,国产一区二区三区免费在线观看,欧美精品三区四区,91久久国产综合久久91,欧美成人精品第一区二区三区 ,美女成人在线观看

專業(yè)信息安全工程師網(wǎng)站|服務(wù)平臺|服務(wù)商(信息安全工程師學(xué)習(xí)QQ群:327677606,客服QQ:800184589)

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 信息安全工程師 >> 每日一練 >> 文章內(nèi)容
信息安全工程師每日一練試題(2023/7/8)

信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html

信息安全工程師每日一練試題(2023/7/8)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2023/7/8

點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)

信息安全工程師每日一練試題內(nèi)容(2023/7/8)

  • 試題1

    1949年,()發(fā)表了題為《保密系統(tǒng)的通信理論》的文章,為密碼技術(shù)的研究奠定了理論基礎(chǔ),由此密碼學(xué)成了一門科學(xué)。
    A.Shannon
    B.Diffie
    C.Hellman
    D.Shamir

    查看答案

    試題參考答案:A

    試題解析與討論:m.xiexiliangjiufa.com/st/3268914698.html

  • 試題2

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    試題參考答案:A、D、C、B、A

    試題解析與討論:m.xiexiliangjiufa.com/st/4115223167.html

  • 試題3

    人為的安全威脅包括主動攻擊和被動攻擊,以下屬于被動攻擊的是(  )。
    A.流量分析
    B.后門
    C.拒絕服務(wù)攻擊
    D.特洛伊木馬

    查看答案

    試題參考答案:A

    試題解析與討論:m.xiexiliangjiufa.com/st/3895218880.html

  • 試題4

    文件型病毒不能感染的文件類型是(  )。
    A.SYS型
    B.EXE類型
    C.COM型
    D.HTML型

    查看答案

    試題參考答案:D

    試題解析與討論:m.xiexiliangjiufa.com/st/389728017.html

  • 試題5

    安全電子交易協(xié)議SET是由VISA和MasterCard兩大信用卡組織聯(lián)合開發(fā)的電子商務(wù)安全協(xié)議。以下關(guān)于SET的敘述中,不正確的是(  )。
    A. SET協(xié)議中定義了參與者之間的消息協(xié)議
    B.SET協(xié)議能夠解決多方認(rèn)證問題
    C.SET協(xié)議規(guī)定交易雙方通過問答機(jī)制獲取對方的公開密鑰
    D.在SET中使用的密碼技術(shù)包括對稱加密、數(shù)字簽名、數(shù)字信封技術(shù)等

    查看答案

    試題參考答案:C

    試題解析與討論:m.xiexiliangjiufa.com/st/411403607.html

  • 試題6

    僵尸網(wǎng)絡(luò)是指采用一種或多種傳播手段, 將大量主機(jī)感染bot程序, 從而在控制者和被感染主機(jī)之間形成的一個可以一對多控制的網(wǎng)絡(luò)。以下不屬于低尸網(wǎng)絡(luò)傳播過程常見方式的是()
    A.主動攻擊漏洞
    B.惡意網(wǎng)站腳本
    C.字典攻擊
    D.郵件病毒

    查看答案

    試題參考答案:C

    試題解析與討論:m.xiexiliangjiufa.com/st/501914322.html

  • 試題7

    蠕蟲是一種可以獨(dú)立運(yùn)行、并且能將自身的一個包含了所有功能的版本傳播到其他計(jì)算機(jī)上的程序。網(wǎng)絡(luò)蠕蟲可以分為:漏洞利用類蠕蟲、口令破解類螨蟲、電子郵件類蠕蟲、P2P類蠕蟲等。以下不屬于漏洞利用類蠕蟲的是()
    A.CodeRed
    B.Slammer
    C.MSBlaster
    D.IRC-worm

    查看答案

    試題參考答案:D

    試題解析與討論:m.xiexiliangjiufa.com/st/5021119931.html

  • 試題8

    (1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
    There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
    Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
    Hidden text within Web pages
    Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
    Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
    steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
    The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
    (1)A、Cryptography
    B、Geography
    C、Stenography
    D、Steganography
    (2)A、methods
    B、software
    C、tools
    D、services
    (3)A、Member
    B、Management
    C、Message
    D、Mail
    (4)A、powerful
    B、sophistication
    C、advanced
    D、easy
    (5)A、least
    B、most
    C、much
    D、less

    查看答案

    試題參考答案:D、A、C、B、A

    試題解析與討論:m.xiexiliangjiufa.com/st/2851420507.html

  • 試題9

    按照密碼系統(tǒng)對明文的處理方法,密碼系統(tǒng)可以分為()
    A、置換密碼系統(tǒng)和易位密碼
    B、密碼學(xué)系統(tǒng)和密碼分析學(xué)系統(tǒng)
    C、對稱密碼系統(tǒng)和非對稱密碼系統(tǒng)
    D、分組密碼系統(tǒng)和序列密碼系統(tǒng)

    查看答案

    試題參考答案:D

    試題解析與討論:m.xiexiliangjiufa.com/st/2845825599.html

  • 試題10

    無線傳感器網(wǎng)絡(luò)容易受到各種惡意攻擊,以下關(guān)于其防御手段說法錯誤的是()。
    A.采用干擾區(qū)內(nèi)節(jié)點(diǎn)切換頻率的方式抵御干擾
    B.通過向獨(dú)立多路徑發(fā)送驗(yàn)證數(shù)據(jù)來發(fā)現(xiàn)異常節(jié)點(diǎn)
    C.利用中心節(jié)點(diǎn)監(jiān)視網(wǎng)絡(luò)中其它所有節(jié)點(diǎn)來發(fā)現(xiàn)惡意節(jié)點(diǎn)
    D.利用安全并具有彈性的時間同步協(xié)議對抗外部攻擊和被俘獲節(jié)點(diǎn)的影響

    查看答案

    試題參考答案:C

    試題解析與討論:m.xiexiliangjiufa.com/st/3274326177.html

信管網(wǎng)訂閱號

信管網(wǎng)視頻號

信管網(wǎng)抖音號

溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準(zhǔn)!

信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。

信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。

相關(guān)內(nèi)容

發(fā)表評論  查看完整評論  

推薦文章

精選

課程

提問

評論

收藏