信息安全工程師當(dāng)天每日一練試題地址:http://m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://m.xiexiliangjiufa.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/3/31)在線測(cè)試:http://m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2017/3/31
信息安全工程師每日一練試題內(nèi)容(2017/3/31)
試題
1: 有三種基本的鑒別的方式:你知道什么,你有什么,以及()。
A、你需要什么
B、你看到什么
C、你是什么
D、你做什么
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2224324841.html試題參考答案:C
試題
2:
在實(shí)施信息安全風(fēng)險(xiǎn)評(píng)估時(shí),需要對(duì)資產(chǎn)的價(jià)值進(jìn)行識(shí)別、分類和賦值,關(guān)于資產(chǎn)價(jià)值的評(píng)估,以下選項(xiàng)中正確的是()
A.資產(chǎn)的價(jià)值指采購(gòu)費(fèi)用
B.資產(chǎn)的價(jià)值指維護(hù)費(fèi)用
C.資產(chǎn)的價(jià)值與其重要性密切相關(guān)
D.資產(chǎn)的價(jià)值無法估計(jì)
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2579521775.html試題參考答案:C
試題
3:
對(duì)業(yè)務(wù)應(yīng)用系統(tǒng)授權(quán)訪問的責(zé)任屬于:()
A.數(shù)據(jù)所有者
B.安全管理員
C.IT 安全經(jīng)理
D.申請(qǐng)人的直線主管
試題解析與討論:
http://m.xiexiliangjiufa.com/st/258643772.html試題參考答案:A
試題
4:
下面哪一個(gè)是定義深度防御安全原則的例子?()
A.使用由兩個(gè)不同提供商提供的防火墻檢查進(jìn)入網(wǎng)絡(luò)的流量
B.在主機(jī)上使用防火墻和邏輯訪問控制來控制進(jìn)入網(wǎng)絡(luò)的流量
C.在數(shù)據(jù)中心建設(shè)中不使用明顯標(biāo)志
D.使用兩個(gè)防火墻檢查不同類型進(jìn)入網(wǎng)絡(luò)的流量
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2587011455.html試題參考答案:A
試題
5:
以下哪組全部是完整性模型?()
A.BLP模型和BIBA模型
B.BIBA模型和Clark-Wilson模型
C.Chinese wall模型和BIBA模型
D.Clark-Wilson模型和Chinese wall模型
試題解析與討論:
http://m.xiexiliangjiufa.com/st/260989416.html試題參考答案:B
試題
6:
災(zāi)難性恢復(fù)計(jì)劃 (DRP) 基于:()
A.技術(shù)方面的業(yè)務(wù)連續(xù)性計(jì)劃
B.操作部分的業(yè)務(wù)連續(xù)性計(jì)劃
C.功能方面的業(yè)務(wù)連續(xù)性計(jì)劃
D.總體協(xié)調(diào)的業(yè)務(wù)連續(xù)性計(jì)劃
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2613925656.html試題參考答案:A
試題
7:
路由器工作在OSI的哪一層()
A.傳輸層
B.數(shù)據(jù)鏈路層
C.網(wǎng)絡(luò)層
D.應(yīng)用層
試題解析與討論:
http://m.xiexiliangjiufa.com/st/262497932.html試題參考答案:C
試題
8:
以下對(duì)Kerberos協(xié)議過程說法正確的是:()
A、協(xié)議可以分為兩個(gè)步驟:一是用戶身份鑒別;二是獲取請(qǐng)求服務(wù)
B、協(xié)議可以分為兩個(gè)步驟:一是獲得票據(jù)許可票據(jù);二是獲取請(qǐng)求服務(wù)
C、協(xié)議可以分為三個(gè)步驟:一是用戶身份鑒別;二是獲得票據(jù)許可票據(jù);三是獲得服務(wù)許可票據(jù)
D、協(xié)議可以分為三個(gè)步驟:一是獲得票據(jù)許可票據(jù);二是獲得服務(wù)許可票據(jù);三是獲得服務(wù)
試題解析與討論:
http://m.xiexiliangjiufa.com/st/269472601.html試題參考答案:D
試題
9:
依據(jù)GB/T24364-2009《信息安全技術(shù)信息安全應(yīng)急響應(yīng)計(jì)劃規(guī)范》,應(yīng)急響應(yīng)方法論的響應(yīng)過程的第二步是()
A、準(zhǔn)備
B、確認(rèn)
C、遏制
D、根除
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2701125919.html試題參考答案:B
試題
10:
部署互聯(lián)網(wǎng)協(xié)議安全虛擬專用網(wǎng)(InternetprotocolSecurityvirtualPrivateNetworkIPsecVPN)時(shí)。以下說法正確的是:()
A.配置MD5安全算法可以提供可靠地?cái)?shù)據(jù)加密
B.配置AES算法可以提供可靠的數(shù)據(jù)完整性驗(yàn)證
C.部署IPsecVIPN網(wǎng)絡(luò)時(shí),需要考慮 IP地址的規(guī)劃,盡量在分支節(jié)點(diǎn)使用可以聚合的IP地址段,來減少IPsec安全關(guān)聯(lián)(SecurityAuthentication,SA)資源的消耗
D.報(bào)文驗(yàn)證頭協(xié)議(AuthenticationHeader,AH)可以提供數(shù)據(jù)機(jī)密性
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2756322187.html試題參考答案:A
試題
11:
如果發(fā)送方使用的加密密鑰和接收方使用的解密密鑰不相同,從其中一個(gè)密鑰難以推出另一個(gè)密鑰,這樣的系統(tǒng)稱為()
A、公鑰加密系統(tǒng)
B、單密鑰加密系統(tǒng)
C、對(duì)稱加密系統(tǒng)
D、常規(guī)加密系統(tǒng)
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2844913838.html試題參考答案:A
試題
12:
以下關(guān)于https協(xié)議http協(xié)議相比的優(yōu)勢(shì)說明,那個(gè)是正確的:()
A.Https協(xié)議對(duì)傳輸?shù)臄?shù)據(jù)進(jìn)行加密,可以避免嗅探等攻擊行為
B.Https使用的端口http不同,讓攻擊者不容易找到端口,具有較高的安全性
C.Https協(xié)議是http協(xié)議的補(bǔ)充,不能獨(dú)立運(yùn)行,因此需要更高的系統(tǒng)性能
D.Https協(xié)議使用了挑戰(zhàn)機(jī)制,在會(huì)話過程中不傳輸用戶名和密碼,因此具有較高的
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2912217592.html試題參考答案:A
試題
13: In the context of effective information security governance, the primary objective of value delivery is to:
A、optimize security investments in support of business objectives.
B、implement a standard set of security practices.
C、institute a standards-based solution.
D、implement a continuous improvement culture.
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2917225372.html試題參考答案:A
試題
14: IT operations for a large organization have been outsourced. An IS auditor reviewing the outsourced operation should be MOST concerned about which of the following findings?
A、The outsourcing contract does not cover disaster recovery for the outsourced IT operations.
B、The service provider does not have incident handling procedures.
C、Recently a corrupted database could not be recovered because of library management problems.
D、Incident logs are not being reviewed.
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2917726817.html試題參考答案:A
試題
15: A financial institution that processes millions of transactions each day has a central communications processor (switch) for connecting to automated teller machines (ATMs). Which of the following would be the BEST contingency plan for the communications processor?
A、Reciprocal agreement with another organization
B、Alternate processor in the same location
C、Alternate processor at another network node
D、Installation of duplex communication links
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2923826329.html試題參考答案:C
試題
16: An IS auditor was hired to review e-business security. The IS auditor's first task was to examine each existing e-business application looking for vulnerabilities. What would be the next task?
A、Report the risks to the CIO and CEO immediately
B、Examine e-business application in development
C、Identify threats and likelihood of occurrence
D、Check the budget available for risk management
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2931627428.html試題參考答案:C
試題
17: During an audit of a business continuity plan (BCP), an IS auditor found that, although all departments were housed in the same building, each department had a separate BCP. The IS auditor recommended that the BCPs be reconciled. Which of the following areas should be reconciled FIRST ?
A、Evacuation plan
B、Recovery priorities
C、Backup storages
D、Call tree
試題解析與討論:
http://m.xiexiliangjiufa.com/st/297931984.html試題參考答案:A
試題
18: Which of the following is a benefit of a risk-based approach to audit planning? Audit:
A、scheduling may be performed months in advance.
B、budgets are more likely to be met by the IS audit staff.
C、staff will be exposed to a variety of technologies.
D、resources are allocated to the areas of highest concern.
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2984822740.html試題參考答案:D
試題
19: Which of the following is MOST directly affected by network performance monitoring tools?
A、Integrity
B、Availability
C、Completeness
D、Confidentiality
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2985325533.html試題參考答案:B
試題
20: 使用企業(yè)內(nèi)的終端或工作臺(tái)會(huì)增加非授權(quán)訪問的可能,當(dāng):()
A.連接點(diǎn)可以使筆記本電腦連接到網(wǎng)絡(luò)
B.用戶謹(jǐn)慎地保密他們的密碼
C.放在不安全地方的終端有密碼保護(hù)
D.在管理員的監(jiān)控下,終端放置小群集環(huán)境中
試題解析與討論:
http://m.xiexiliangjiufa.com/st/3042913549.html試題參考答案:A