信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/5/15)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/5/15
點擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/5/15)
試題
1: The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as:
A、rules.
B、decision trees.
C、semantic nets.
D、dataflow diagrams.
試題解析與討論:
m.xiexiliangjiufa.com/st/297063301.html試題參考答案:B
試題
2: A benefit of quality of service (QoS) is that the:
A、entire network's availability and performance will be significantly improved.
B、telecom carrier will provide the company with accurate service-level compliance reports.
C、participating applications will have guaranteed service levels.
D、communications link will be supported by security controls to perform secure online transactions.
試題解析與討論:
m.xiexiliangjiufa.com/st/29515286.html試題參考答案:C
試題
3:
下列哪個漏洞不是由于未對輸入做過濾造成的?()
A、 DOS攻擊
B、 SQL注入
C、 日志注入
D、 命令行注入
試題解析與討論:
m.xiexiliangjiufa.com/st/2674812408.html試題參考答案:A
試題
4: 網(wǎng)站的安全協(xié)議是https時,該網(wǎng)站瀏覽時會進行()處理。
A.增加訪問標(biāo)記
B.加密
C.身份隱藏
D.口令驗證
試題解析與討論:
m.xiexiliangjiufa.com/st/3269912294.html試題參考答案:B
試題
5: To ensure message integrity, confidentiality and nonrepudiation between two parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against:
A、the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key by using the receiver's public key.
B、any part of the message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key using the receiver's public key.
C、the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering both the encrypted message and digest using the receiver's public key.
D、the entire message, enciphering the message digest using the sender's private key and enciphering the message using the receiver's public key.
試題解析與討論:
m.xiexiliangjiufa.com/st/291706875.html試題參考答案:A
試題
6: The FIRST step in managing the risk of a cyberattack is to:
A、assess the vulnerability impact.
B、evaluate the likelihood of threats.
C、identify critical information assets.
D、estimate potential damage.
試題解析與討論:
m.xiexiliangjiufa.com/st/2928826144.html試題參考答案:C
試題
7: When identifying an earlier project completion time, which is to be obtained by paying a premium for early completion, the activities that should be selected are those:
A、whose sum of activity time is the shortest.
B、that have zero slack time.
C、that give the longest possible completion time.
D、whose sum of slack time is the shortest.
試題解析與討論:
m.xiexiliangjiufa.com/st/2942113311.html試題參考答案:B
試題
8:
以下哪一項在防止數(shù)據(jù)介質(zhì)被濫用時是不推薦使用的方法:()
A、禁用主機的CD驅(qū)動、USB接口等IO 設(shè)備
B、對不再使用的硬盤進行嚴(yán)格的數(shù)據(jù)清除
C、將不再使用的紙質(zhì)文件用碎紙機粉碎
D、用快速格式化刪除存儲介質(zhì)中的保密文件
試題解析與討論:
m.xiexiliangjiufa.com/st/2739026080.html試題參考答案:D
試題
9: An example of a direct benefit to be derived from a proposed IT-related business investment is:
A、enhanced reputation.
B、enhanced staff morale.
C、the use of new technology.
D、increased market penetration.
試題解析與討論:
m.xiexiliangjiufa.com/st/296405210.html試題參考答案:D
試題
10:
以下哪些是需要在信息安全策略中進行描述的:()
A、組織信息系統(tǒng)安全架構(gòu)
B、信息安全工作的基本原則
C、組織信息安全技術(shù)參數(shù)
D、組織信息安全實施手段
試題解析與討論:
m.xiexiliangjiufa.com/st/2745422461.html試題參考答案:A