信息安全工程師當天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2024/1/27)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2024/1/27
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內(nèi)容(2024/1/27)
試題1
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
試題參考答案:C、B、C、D、A
試題2
(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
查看答案
試題參考答案:D、A、C、B、A
試題3
下列各種協(xié)議中,不屬于身份認證協(xié)議的是()查看答案
試題參考答案:D
試題4
對無線網(wǎng)絡(luò)的攻擊可以分為:對無線接口的攻擊、對無線設(shè)備的攻擊和對無線網(wǎng)絡(luò)的攻擊。以下屬于對無線設(shè)備攻擊的是( )。查看答案
試題參考答案:C
試題5
在我國,依據(jù)《中華人民共和國標準化法》可以將標準劃分為:國家標準、行業(yè)標準、地方標準和企業(yè)標準4個層次?!缎畔踩夹g(shù)信息系統(tǒng)安全等級保護基本要求》 (GB/T 22239-2008)屬于( )。查看答案
試題參考答案:A
試題6
PDRR信息模型改進了傳統(tǒng)的只有保護的單一安全防御思想,強調(diào)信息安全保障的四個重要環(huán)節(jié):保護(Protection)、檢測(Detection)、恢復(Recovery)、響應(Response)。其中,信息隱藏是屬于()的內(nèi)容。查看答案
試題參考答案:A
試題7
確保信息僅被合法實體訪問,而不被泄露給非授權(quán)的實體或供其利用的特性是指信息的( )。查看答案
試題參考答案:C
試題8
有一種原則是對信息進行均衡、全面的防護,提高整個系統(tǒng)的安全性能,該原則稱為()
A、動態(tài)化原則
B、木桶原則
C、等級性原則
D、整體原則
查看答案
試題參考答案:B
試題9
網(wǎng)絡(luò)安全漏洞是網(wǎng)絡(luò)安全管理工作的重要內(nèi)容,網(wǎng)絡(luò)信息系統(tǒng)的漏洞主要來自兩個方面:非技術(shù)性安全漏洞和技術(shù)性安全漏洞。以下屬于非技術(shù)性安全漏洞主要來源的是 ( )查看答案
試題參考答案:C
試題10
IP地址欺騙的發(fā)生過程,下列順序正確的是()。①確定要攻擊的主機A;②發(fā)現(xiàn)和他有信任關(guān)系的主機B;③猜測序列號;④成功連接,留下后面;⑤將B利用某種方法攻擊癱瘓。查看答案
試題參考答案:A
信管網(wǎng)訂閱號
信管網(wǎng)視頻號
信管網(wǎng)抖音號
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質(zhì)量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |