信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class27-6-1.aspx
信息安全工程師每日一練試題(2019/5/8)在線測(cè)試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2019/5/8
信息安全工程師每日一練試題內(nèi)容(2019/5/8)
試題
1:
安全管理是信息系統(tǒng)安全能動(dòng)性的組成部分,它貫穿于信息系統(tǒng)規(guī)劃、設(shè)計(jì)、運(yùn)行和維護(hù)的各階段。安全管理中的介質(zhì)安全屬于( )。
A.技術(shù)安全
B.管理安全
C.物理安全
D.環(huán)境安全
試題解析與討論:
m.xiexiliangjiufa.com/st/352122.html試題參考答案:C
試題
2:
WindowsNT和Windows2000系統(tǒng)能設(shè)置為在若干次無(wú)效登錄后鎖定賬號(hào),此技術(shù)可以防止( )。
A、暴力攻擊
B、木馬病毒
C、緩存溢出攻擊
D、IP欺騙
試題解析與討論:
m.xiexiliangjiufa.com/st/787271.html試題參考答案:A
試題
3:
“沖擊波”病毒屬于 (1) 類(lèi)型的病毒,它利用 Windows 操作系統(tǒng)的 (2) 漏 洞進(jìn)行快速傳播。
(1)A、蠕蟲(chóng)
B、文件
C、引導(dǎo)區(qū)
D、郵件
(2)A、CGI 腳本
B、RPC
C、DNS
D、IMAP
試題解析與討論:
m.xiexiliangjiufa.com/st/78802713.html試題參考答案:A、B
試題
4:
安全電子郵件使用( )協(xié)議。
A、PGP
B、HTTPS
C、MIME
D、DES
試題解析與討論:
m.xiexiliangjiufa.com/st/92793195.html試題參考答案:A
試題
5:
()把整個(gè)軟件開(kāi)發(fā)流程分成多個(gè)階段,每一個(gè)階段都由目標(biāo)設(shè)定、風(fēng)險(xiǎn)分析、開(kāi)發(fā)和有效性驗(yàn)證以及評(píng)審構(gòu)成。
A.原型模型
B.瀑布模型
C.螺旋模型
D. V模型
試題解析與討論:
m.xiexiliangjiufa.com/st/1266928914.html試題參考答案:C
試題
6:
某服務(wù)器軟件系統(tǒng)對(duì)可用性(Availability),性能( Performance )和可修改性 (Modification)的要求較高,(1)設(shè)計(jì)策略能提高該系統(tǒng)的可用性,(2)設(shè)計(jì)策略能夠提高該系統(tǒng)的性能,(3)設(shè)計(jì)策略能夠提高該系統(tǒng)的可修改性。
(1)A.Ping/Echo
B.限制訪問(wèn)
C.運(yùn)行時(shí)注冊(cè)
D.接口-實(shí)現(xiàn)分離
(2)A.分層結(jié)構(gòu)
B.事務(wù)機(jī)制
C.主動(dòng)兀余
D.隊(duì)列調(diào)度
(3)A.信息隱藏
B.記錄/回放
C.任務(wù)模型
D.回滾
試題解析與討論:
m.xiexiliangjiufa.com/st/1269025300.html試題參考答案:A、D、A
試題
7: 包過(guò)濾型防火墻作為比較簡(jiǎn)單的防火墻,主要機(jī)制是檢查出入數(shù)據(jù)包()地址。
A、物理層
B、網(wǎng)絡(luò)層
C、數(shù)據(jù)鏈路層
D、應(yīng)用層
試題解析與討論:
m.xiexiliangjiufa.com/st/1272529760.html試題參考答案:B
試題
8: 逆向工程導(dǎo)出的信息可以分為實(shí)現(xiàn)級(jí)、結(jié)構(gòu)級(jí)、功能級(jí)和領(lǐng)域級(jí)四個(gè)抽象層次。程序的抽象語(yǔ)法樹(shù)屬于(1);反映程序分量之間相互依賴關(guān)系的信息屬于(2)。
(1)A.實(shí)現(xiàn)級(jí)
B.結(jié)構(gòu)級(jí)
C.功能級(jí)
D.領(lǐng)域級(jí)
(2)A.實(shí)現(xiàn)級(jí)
B.結(jié)構(gòu)級(jí)
C.功能級(jí)
D.領(lǐng)域級(jí)
試題解析與討論:
m.xiexiliangjiufa.com/st/1884323217.html試題參考答案:A、B
試題
9:
甲和乙要進(jìn)行通信,甲對(duì)發(fā)送的消息附加了數(shù)字簽名,乙收到該消息后利用()驗(yàn)證該消息的真實(shí)性。
A.甲的公鑰
B.甲的私鑰
C.乙的公鑰
D.乙的私鑰
試題解析與討論:
m.xiexiliangjiufa.com/st/2473913350.html試題參考答案:A
試題
10: The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the (71) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (72), one also has to decide whether to use a two-tier, three-tier,or n-tier architecture. Then the requirements and the architecture design are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (73) specify the operating environment(s) in which the system must perform and how those may change over time. (74) focus on the nonfunctional requirements issues such as response time,capacity,and reliability. (75) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used.
(71)A.functional requirements
B.nonfunctional requirements
C.system constraint
D.system operational environment
(72)A.client-based architecture
B.server-based architecture
C.network architecture
D.client-server architecture
(73)A.Operational requirements
B.Speed requirement
C.Access control requirements
D.Customization requirements
(74)A.Environment requirements
B.Maintainability requirements
C.Performance requirements
D.Virus control requirements
(75)A.Safety requirements
B.Security requirements
C.Data management requirements
D.System requirements
試題解析與討論:
m.xiexiliangjiufa.com/st/3936428375.html試題參考答案:B、D、A、C、B