信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2023/9/11)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2023/9/11
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2023/9/11)
試題1
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
試題參考答案:D、C、A、B、A
試題2
網(wǎng)絡(luò)安全管理是對網(wǎng)絡(luò)系統(tǒng)中網(wǎng)管對象的風(fēng)險(xiǎn)進(jìn)行控制。給操作系統(tǒng)打補(bǔ)丁屬于( )方法。查看答案
試題參考答案:C
試題3
深度流檢測技術(shù)就是以流為基本研究對象,判斷網(wǎng)絡(luò)流是否異常的一種網(wǎng)絡(luò)安全技術(shù),其主要組成部分通常不包括()
A、流特征選擇
B、流特征提供
C、分類器
D、響應(yīng)
查看答案
試題參考答案:D
試題4
包過濾是在IP層實(shí)現(xiàn)的防火墻技術(shù),根據(jù)包的源IP地址、目的IP地址、源端口、目的端口及包傳遞方向等包頭信息判新是否允許包通過。包過濾型防火墻擴(kuò)展IP訪問控制規(guī)則的格式如下:查看答案
試題參考答案:B
試題5
SM4是一種分組密碼算法,其分組長度和密鑰長度分別為()。查看答案
試題參考答案:B
試題6
( )攻擊是指借助于客戶機(jī)/服務(wù)器技術(shù),將多個(gè)計(jì)算機(jī)聯(lián)合起來作為攻擊平臺(tái),對一個(gè)或多個(gè)目標(biāo)發(fā)動(dòng)DoS攻擊,從而成倍地提高拒絕服務(wù)攻擊的威力。查看答案
試題參考答案:B
試題7
以下關(guān)于認(rèn)證技術(shù)的描述中,錯(cuò)誤的是( )。查看答案
試題參考答案:C
試題8
當(dāng)防火墻在網(wǎng)絡(luò)層實(shí)現(xiàn)信息過濾與控制時(shí),主要針對TCP/IP協(xié)議中的數(shù)據(jù)包頭制定規(guī)則匹配條件并實(shí)施過濾,該規(guī)則的匹配條件不包括( )。查看答案
試題參考答案:B
試題9
在非安全的通信環(huán)境中,為了保證消息來源的可靠性,通常采用的安全防護(hù)技術(shù)是()查看答案
試題參考答案:C
試題10
能力成熟度模型(CMM)是對一個(gè)組織機(jī)構(gòu)的能力進(jìn)行成熟度評估的模型,成熟度級別一般分為五級:1級-非正式執(zhí)行,2級-計(jì)劃跟蹤,3級-充分定義,4級-量化控制,5級-持續(xù)優(yōu)化。在軟件安全能力成熟度模型中,漏洞評估過程屬于( )查看答案
試題參考答案:C
信管網(wǎng)訂閱號
信管網(wǎng)視頻號
信管網(wǎng)抖音號
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評論 查看完整評論 | |