信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2023/10/28)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2023/10/28
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2023/10/28)
試題1
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
試題參考答案:D、C、A、B、A
試題2
有線等效保密協(xié)議WEP是IEEE 802.11標(biāo)準(zhǔn)的一部分,其為了實(shí)現(xiàn)機(jī)密性采用的加密算法是()查看答案
試題參考答案:C
試題3
數(shù)字簽名是對以數(shù)字形式儲存的消息就行某種處理,產(chǎn)生一種類似于傳統(tǒng)手書簽名功效的消息處理過程,一個數(shù)字簽名體制通常包括兩個部分,()查看答案
試題參考答案:A
試題4
入侵取證是指通過特定的軟件和工具,從計算機(jī)及網(wǎng)絡(luò)系統(tǒng)中提取攻擊證據(jù)。以下網(wǎng)絡(luò)安全取證步驟正確的是( )。查看答案
試題參考答案:B
試題5
網(wǎng)絡(luò)流量數(shù)據(jù)挖掘分析是對采集到的網(wǎng)絡(luò)流量數(shù)據(jù)進(jìn)行挖掘,提取網(wǎng)絡(luò)流量信息,形成網(wǎng)絡(luò)審計記錄。網(wǎng)絡(luò)流量數(shù)據(jù)挖掘分析主要包括:郵件收發(fā)協(xié)議審計、網(wǎng)頁瀏覽審計、文件共享審計、文件傳輸審計、遠(yuǎn)程訪問審計等。其中文件傳輸審計主要針對( )協(xié)議。查看答案
試題參考答案:B
試題6
SMTP是一種提供可靠有效的電子郵件傳輸?shù)膮f(xié)議,采用客戶服務(wù)器的工作方式,在傳輸層使用TCP協(xié)議進(jìn)行傳輸。SMTP發(fā)送協(xié)議中,傳送報文文本的指令是() 。查看答案
試題參考答案:D
試題7
P2DR模型是一種體現(xiàn)主動防御思想的網(wǎng)絡(luò)安全模型,該模型中D表示( )。查看答案
試題參考答案:B
試題8
防火墻的安全規(guī)則由匹配條件和處理方式兩部分組成。當(dāng)網(wǎng)絡(luò)流量與當(dāng)前的規(guī)則匹配時,就必須采用規(guī)則中的處理方式進(jìn)行處理。其中,拒絕數(shù)據(jù)包或信息通過,并且通 知信息源該信息被禁止的處理方式是( )。查看答案
試題參考答案:B
試題9
從對信息的破壞性上看,網(wǎng)絡(luò)攻擊可以分為被動攻擊和主動攻擊,以下屬于被動攻擊的是( )。查看答案
試題參考答案:B
試題10
研究密碼破譯的科學(xué)稱為密碼分析學(xué)。密碼分析學(xué)中,根據(jù)密碼分析者可利用的數(shù)據(jù)資源,可將攻擊密碼的類型分為四種,其中適于攻擊公開密鑰密碼體制,特別是攻擊其數(shù)字簽名的是 ( )。查看答案
試題參考答案:C
信管網(wǎng)訂閱號
信管網(wǎng)視頻號
信管網(wǎng)抖音號
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評論 查看完整評論 | |