信息安全工程師當(dāng)天每日一練試題地址:http://m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://m.xiexiliangjiufa.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/7/17)在線(xiàn)測(cè)試:http://m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2017/7/17
信息安全工程師每日一練試題內(nèi)容(2017/7/17)
試題
1:
( )屬于保證數(shù)據(jù)的完整性。
A、 保證傳送的數(shù)據(jù)信息不被第三方監(jiān)視和竊取
B、 保證數(shù)據(jù)信息在傳輸過(guò)程中不被篡改
C、 保證電子商務(wù)交易各方身份的真實(shí)性
D、 保證發(fā)送方不能抵賴(lài)曾經(jīng)發(fā)送過(guò)某數(shù)據(jù)信息
試題解析與討論:
http://m.xiexiliangjiufa.com/st/57701987.html試題參考答案:B
試題
2: 路由器在轉(zhuǎn)發(fā)IP分組時(shí),一般不檢查IP分組的源地址,因此可以偽造IP分組的源地址進(jìn)行攻擊,使得網(wǎng)絡(luò)管理員無(wú)法追蹤。()
A、對(duì)
B、錯(cuò)
試題解析與討論:
http://m.xiexiliangjiufa.com/st/240574504.html試題參考答案:A
試題
3: 下面哪一個(gè)情景屬于審計(jì)(Audit)()
A、用戶(hù)依照系統(tǒng)提示輸入用戶(hù)名和口令
B、用戶(hù)在網(wǎng)絡(luò)上共享了自己編寫(xiě)的一份Office文檔,并設(shè)定哪些用戶(hù)可以閱讀,哪些用戶(hù)可以修改
C、用戶(hù)使用加密軟件對(duì)自己編寫(xiě)的Office文檔進(jìn)行加密,以阻止其他人得到這份拷貝后看到文檔中的內(nèi)容
D、某個(gè)人嘗試登錄到你的計(jì)算機(jī)中,但是口令輸入的不對(duì),系統(tǒng)提示口令錯(cuò)誤,并將這次失敗的登錄過(guò)程紀(jì)錄在系統(tǒng)日志中
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2410423167.html試題參考答案:D
試題
4: 《中華人民共和國(guó)計(jì)算機(jī)信息系統(tǒng)安全保護(hù)條例》是什么時(shí)候頒布的?()
A、1993年
B、1994年
C、1995年
試題解析與討論:
http://m.xiexiliangjiufa.com/st/243645419.html試題參考答案:B
試題
5: In an organization where an IT security baseline has been defined, an IS auditor should FIRST ensure:
A、implementation.
B、compliance.
C、documentation.
D、sufficiency.
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2917312670.html試題參考答案:D
試題
6: An IS auditor conducting a review of disaster recovery planning (DRP) at a financial processing organization has discovered the following:
The existing disaster recovery plan was compiled two years earlier by a systems analyst in the organization's IT department using transaction flow projections from the operations department.
The plan was presented to the deputy CEO for approval and formal issue, but it is still awaiting his/her attention.
The plan has never been updated, tested or circulated to key management and staff, though interviews show that each would know what action to take for its area in the event of a disruptive incident.
The basis of an organization's disaster recovery plan is to reestablish live processing at an alternative site where a similar, but not identical, hardware configuration is already established. An IS auditor should:
A、take no action as the lack of a current plan is the only significant finding.
B、recommend that the hardware configuration at each site is identical.
C、perform a review to verify that the second configuration can support live processing.
D、report that the financial expenditure on the alternative site is wasted without an effective plan.
試題解析與討論:
http://m.xiexiliangjiufa.com/st/292751794.html試題參考答案:C
試題
7: Sending a message and a message hash encrypted by the sender's private key will ensure:
A、authenticity and integrity.
B、authenticity and privacy.
C、integrity and privacy.
D、privacy and nonrepudiation.
試題解析與討論:
http://m.xiexiliangjiufa.com/st/293158368.html試題參考答案:A
試題
8: 一個(gè)IS審計(jì)師應(yīng)該擔(dān)憂(yōu)當(dāng)一個(gè)電信分析員()
A、監(jiān)視系統(tǒng)表現(xiàn)和對(duì)程序變化的跟蹤問(wèn)題報(bào)告
B、根據(jù)現(xiàn)在的和將來(lái)的處理需求來(lái)檢查網(wǎng)絡(luò)負(fù)載需求
C、評(píng)估網(wǎng)絡(luò)負(fù)載的終端反應(yīng)時(shí)間和網(wǎng)絡(luò)數(shù)據(jù)傳輸速率的效果
D、推薦網(wǎng)絡(luò)平衡過(guò)程和改進(jìn)措施
試題解析與討論:
http://m.xiexiliangjiufa.com/st/2996924581.html試題參考答案:A
試題
9: 下列哪個(gè)確保在互聯(lián)網(wǎng)上傳送的信息的保密性?()
A、數(shù)字簽名
B、數(shù)字證書(shū)
C、在線(xiàn)證書(shū)狀態(tài)協(xié)議
D、私鑰加密系統(tǒng)
試題解析與討論:
http://m.xiexiliangjiufa.com/st/301513221.html試題參考答案:D
試題
10: 在計(jì)劃審計(jì)的時(shí)候應(yīng)該進(jìn)行一次風(fēng)險(xiǎn)評(píng)估以提供:()
A、審計(jì)會(huì)涵蓋實(shí)質(zhì)的項(xiàng)目的合理的保證
B、絕對(duì)的保證實(shí)質(zhì)項(xiàng)目在審計(jì)工作過(guò)程中會(huì)被涵蓋
C、合理的保證所有的項(xiàng)目都會(huì)被涵蓋在這次審計(jì)中
D、足夠的保證所有項(xiàng)目在這次審計(jì)工作中都會(huì)被涵蓋
試題解析與討論:
http://m.xiexiliangjiufa.com/st/3050917961.html試題參考答案:A