信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/5/12)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/5/12
點擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/5/12)
試題
1:
在一個分布式環(huán)境中,以下哪一項能夠最大程度減輕服務(wù)器故障的影響?()
A.冗余路徑
B.(服務(wù)器)集群
C.撥號備份鏈路
D.備份電源
試題解析與討論:
m.xiexiliangjiufa.com/st/2618918436.html試題參考答案:B
試題
2:
在冗余磁盤陳列中,以下不具有容錯技術(shù)的是()
A、RAID 0
B、RAID 1
C、RAID 3
D、RAID 5
試題解析與討論:
m.xiexiliangjiufa.com/st/2645717998.html試題參考答案:A
試題
3: During a security audit of IT processes, an IS auditor found that there were no documented security procedures. The IS auditor should:
A、create the procedures document.
B、terminate the audit.
C、conduct compliance testing.
D、identify and evaluate existing practices.
試題解析與討論:
m.xiexiliangjiufa.com/st/2955220511.html試題參考答案:D
試題
4: When implementing an IT governance framework in an organization the MOST important objective is:
A、IT alignment with the business.
B、accountability.
C、value realization with IT.
D、enhancing the return on IT investments.
試題解析與討論:
m.xiexiliangjiufa.com/st/2919426966.html試題參考答案:A
試題
5: An IS auditor noted that an organization had adequate business continuity plans (BCPs) for each individual process, but no comprehensive BCP. Which would be the BEST course of action for the IS auditor?
A、Recommend that an additional comprehensive BCP be developed.
B、Determine whether the BCPs are consistent.
C、Accept the BCPs as written.
D、Recommend the creation of a single BCP.
試題解析與討論:
m.xiexiliangjiufa.com/st/294206479.html試題參考答案:B
試題
6: Which of the following is the PRIMARY advantage of using computer forensic software for investigations?
A、The preservation of the chain of custody for electronic evidence
B、Time and cost savings
C、Efficiency and effectiveness
D、Ability to search for violations of intellectual property rights
試題解析與討論:
m.xiexiliangjiufa.com/st/2979018681.html試題參考答案:A
試題
7: The implementation of access controls FIRST requires:
A、a classification of IS resources.
B、the labeling of IS resources.
C、the creation of an access control list.
D、an inventory of IS resources.
試題解析與討論:
m.xiexiliangjiufa.com/st/2937124471.html試題參考答案:D
試題
8: 以下關(guān)于NAT的說法中,錯誤的是()
A.NAT允許一個機(jī)構(gòu)專用Intranet中的主機(jī)透明的連接到公共域中的主機(jī),五需每臺內(nèi)部主機(jī)都擁有注冊的(已經(jīng)越來越缺乏的)全局互聯(lián)網(wǎng)地址
B.靜態(tài)NAT是設(shè)置起來最簡單和最容易實現(xiàn)的一種地址轉(zhuǎn)換方式,內(nèi)部網(wǎng)絡(luò)中的每個主機(jī)都被永久映射成外部網(wǎng)絡(luò)中的某個合法地址
C.動態(tài)NAT主要應(yīng)用于撥號和頻繁的遠(yuǎn)程連接,當(dāng)遠(yuǎn)程用戶連接上之后,動態(tài)NAT就會分配給用戶一個IP地址,當(dāng)用戶斷開時,這個IP地址就會被釋放而留待以后使用
D.動態(tài)NAT又叫網(wǎng)絡(luò)端口轉(zhuǎn)換NAPT試題解析與討論:
m.xiexiliangjiufa.com/st/327091424.html試題參考答案:D
試題
9: The use of object-oriented design and development techniques would MOST likely:
A、facilitate the ability to reuse modules.
B、improve system performance.
C、enhance control effectiveness.
D、speed up the system development life cycle.
試題解析與討論:
m.xiexiliangjiufa.com/st/295177699.html試題參考答案:A
試題
10: Which of the following BEST restricts users to those functions needed to perform their duties?
A、Application level access control
B、Data encryption
C、Disabling floppy disk drives
D、Network monitoring device
試題解析與討論:
m.xiexiliangjiufa.com/st/2968325592.html試題參考答案:A