信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/6/5)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/6/5
點擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/6/5)
試題
1: Which of the following would an IS auditor consider to be the MOST important to review when conducting a business continuity audit?
A、A hot site is contracted for and available as needed.
B、A business continuity manual is available and current.
C、Insurance coverage is adequate and premiums are current.
D、Media backups are performed on a timely basis and stored offsite.
試題解析與討論:
m.xiexiliangjiufa.com/st/2950028055.html試題參考答案:D
試題
2: Which of the following is a network diagnostic tool that monitors and records network information?
A、Online monitor
B、Downtime report
C、Help desk report
D、Protocol analyzer
試題解析與討論:
m.xiexiliangjiufa.com/st/2932821084.html試題參考答案:D
試題
3: In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should:
A、identify and assess the risk assessment process used by management.
B、identify information assets and the underlying systems.
C、disclose the threats and impacts to management.
D、identify and evaluate the existing controls.
試題解析與討論:
m.xiexiliangjiufa.com/st/2951027327.html試題參考答案:D
試題
4: Which of the following functions should be performed by the application owners to ensure an adequate segregation of duties between IS and end users?
A、System analysis
B、Authorization of access to data
C、Application programming
D、Data administration
試題解析與討論:
m.xiexiliangjiufa.com/st/2958812980.html試題參考答案:B
試題
5: Which of the following is the MOST reasonable option for recovering a noncritical system?
A、Warm site
B、Mobile site
C、Hot site
D、Cold site
試題解析與討論:
m.xiexiliangjiufa.com/st/2924915346.html試題參考答案:D
試題
6: An organization currently using tape backups takes one full backup weekly and incremental backups daily. They recently augmented their tape backup procedures with a backup-to-disk solution. This is appropriate because:
A、fast synthetic backups for offsite storage are supported.
B、backup to disk is always significantly faster than backup to tape.
C、tape libraries are no longer needed.
D、data storage on disks is more reliable than on tapes.
試題解析與討論:
m.xiexiliangjiufa.com/st/2933910522.html試題參考答案:A
試題
7:
下列哪一種防病毒軟件的實施策略在內(nèi)部公司網(wǎng)絡(luò)中是最有效的:()
A. 服務(wù)器防毒軟件
B.病毒墻
C. 工作站防病毒軟件
D. 病毒庫及時更新
試題解析與討論:
m.xiexiliangjiufa.com/st/2587722546.html試題參考答案:D
試題
8: 2017年6月1日,()開始施行。
A.中華人民共和國計算機信息系統(tǒng)安全保護條例
B.計算機信息系統(tǒng)國際聯(lián)網(wǎng)保密管理規(guī)定
C.中華人民共和國網(wǎng)絡(luò)安全法
D.中華人民共和國電子簽名法
試題解析與討論:
m.xiexiliangjiufa.com/st/32754695.html試題參考答案:C
試題
9: Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
A、Intrusion detection systems
B、Data mining techniques
C、Firewalls
D、Packet filtering routers
試題解析與討論:
m.xiexiliangjiufa.com/st/2941317904.html試題參考答案:B
試題
10:
RSA 與DES相比的優(yōu)點是:()
A、它可以提供數(shù)字簽名和加密功能
B、由于使用對稱密鑰它使用的資源少加密速度快
C、前者是分組加密后者是流加密
D、它使用一次性加密本
試題解析與討論:
m.xiexiliangjiufa.com/st/2739411722.html試題參考答案:A