信息安全工程師當天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2024/3/30)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2024/3/30
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內(nèi)容(2024/3/30)
試題1
美國國家標準與技術(shù)研究院 NIST 發(fā)布了《提升關鍵基礎設施網(wǎng)絡安全的框架》,該框架定義了五種核心功能:識別(ldentify)、保護(Protect)、檢測(Detect)、響應(Respond)、恢復(Recover),每個功能對應具體的子類。其中,訪問控制子類屬于( )功能。查看答案
試題參考答案:B
試題2
雜湊函數(shù)SHAI的輸入分組長度為()比特
A、128
B、258
C、512
D、1024
查看答案
試題參考答案:C
試題3
訪問控制是對信息系統(tǒng)資源進行保護的重要措施,適當?shù)脑L問控制能夠阻止未經(jīng)授權(quán)的用戶有意或者無意地獲取資源。如果按照訪問控制的對象進行分類,對文件讀寫進行訪問控制屬于( )。查看答案
試題參考答案:B
試題4
Perhaps the most obvious difference between private-key and public-key encryption is that the former assumes complete secrecy of all cry to graphic keys, whereas the latter requires secrecy for only the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting the communicating parties must somehow be able to share the (71) key without allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other over a public channel without compromising security.For parties shouting across a room or, more realistically , communicating over a public network like a phone line or then ternet, public-key encryption is the only option.
Another important distinction is that private-key encryption sch emesuse the (73) key for both encryption and decryption, whereas public key encryption schemes use (74) keys for each operation.That is public-key encryption is inherently as ymmetri C.This asymmetry in the public-key setting means that the roles of sender and receiver are not interchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectional communication can be achieved in a number of ways; the point is that a single invocation of a public-key encryption scheme forces ad is tinction between one user who acts as a receiver and other users who act as senders.)。In addition, a single instance of a (75) encryption scheme enables multiple senders to communicate privately with a single receiver,in contrast to the private-key case where a secret key shared between two parties enables private communication only between those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash
查看答案
試題參考答案:D、C、B、A、B
試題5
網(wǎng)絡系統(tǒng)中針對海量數(shù)據(jù)的加密,通常不采用()
A、鏈路加密
B、會話加密
C、公鑰加密
D、端對端加密
查看答案
試題參考答案:C
試題6
PDRR 模型由防護(Protection),檢測(Detection)、恢復(Recovery)、響應(Response)四個重要環(huán)節(jié)組成。數(shù)據(jù)備份對應的環(huán)節(jié)是( )查看答案
試題參考答案:C
試題7
IPSec是Internet Protocol Security 的縮寫,以下關于IPSec 協(xié)議的敘述中,錯誤的是( )。查看答案
試題參考答案:B
試題8
自主訪問控制是指客體的所有者按照自己的安全策略授予系統(tǒng)中的其他用戶對其的訪問權(quán)。自主訪問控制的實現(xiàn)方法包括基于行的自主訪問控制和基于列的自主訪問控制兩大類,以下屬于基于列的自主訪問控制實現(xiàn)方法的是()。查看答案
試題參考答案:A
試題9
網(wǎng)絡流量是單位時間內(nèi)通過網(wǎng)絡設備或傳輸介質(zhì)的信息量。網(wǎng)絡流量狀況是網(wǎng)絡中的重要信息,利用流量監(jiān)測獲得的數(shù)據(jù),不能實現(xiàn)的目標是( )。查看答案
試題參考答案:C
試題10
對信息進行均衡、全面的防護,提高整個系統(tǒng)“安全最低點”的安全性能,這種安全原則被稱為( )。查看答案
試題參考答案:B
信管網(wǎng)訂閱號
信管網(wǎng)視頻號
信管網(wǎng)抖音號
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質(zhì)量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |