信息安全工程師當(dāng)天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/6/18)在線(xiàn)測(cè)試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/6/18
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/6/18)
試題
1: A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?
A、Comparing source code
B、Reviewing system log files
C、Comparing object code
D、Reviewing executable and source code integrity
試題解析與討論:
m.xiexiliangjiufa.com/st/2957425693.html試題參考答案:B
試題
2:
電子郵件客戶(hù)端通常需要用()協(xié)議來(lái)發(fā)送郵件。
A.僅SMTP
B.僅POP
C.SMTP 和POP
D.以上都不正確
試題解析與討論:
m.xiexiliangjiufa.com/st/2682923626.html試題參考答案:A
試題
3: 對(duì)于定義在GF(p)上的橢圓曲線(xiàn),取素?cái)?shù)P=11,橢圓曲線(xiàn)y2=x3+x+6mod11,則以下是橢圓曲線(xiàn)11平方剩余的是( )。
A.x=1
B.x=3
C.x=6
D.x=9
試題解析與討論:
m.xiexiliangjiufa.com/st/3898520398.html試題參考答案:B
試題
4: Functionality is a characteristic associated with evaluating the quality of software products throughout their life cycle, and is BEST described as the set of attributes that bear on the:
A、existence of a set of functions and their specified properties.
B、ability of the software to be transferred from one environment to another.
C、capability of software to maintain its level of performance under stated conditions.
D、relationship between the performance of the software and the amount of resources used.
試題解析與討論:
m.xiexiliangjiufa.com/st/292326558.html試題參考答案:A
試題
5: In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model?
A、Optimized
B、Managed
C、Defined
D、Repeatable
試題解析與討論:
m.xiexiliangjiufa.com/st/292603206.html試題參考答案:B
試題
6: 密碼體制是一種代表性的古典密碼算法,在凱撒密碼體制中,設(shè)置密鑰參數(shù)k = 3,
依次對(duì)密文“zhonggguo”進(jìn)行加密,則相應(yīng)的密文為()
A.ckrqjjxr
B.cdrqjjxr
C.Akrqjjxr
D.Ckrqiixr試題解析與討論:
m.xiexiliangjiufa.com/st/3269123998.html試題參考答案:A
試題
7: Integrating business continuity planning (BCP) into an IT project aids in:
A、the retrofitting of the business continuity requirements.
B、the development of a more comprehensive set of requirements.
C、the development of a transaction flowchart.
D、ensuring the application meets the user's needs.
試題解析與討論:
m.xiexiliangjiufa.com/st/297596764.html試題參考答案:B
試題
8:
基本的計(jì)算機(jī)安全需求不包括下列哪一條:()
A.安全策略和標(biāo)識(shí)
B.絕對(duì)的保證和持續(xù)的保護(hù)
C. 身份鑒別和落實(shí)責(zé)任
D. 合理的保證和連續(xù)的保護(hù)
試題解析與討論:
m.xiexiliangjiufa.com/st/2588428880.html試題參考答案:B
試題
9:
若 Bob 給 Alice 發(fā)送一封郵件,并想讓 Alice 確信郵件是由 Bob 發(fā)出的,則 Bob 應(yīng)該選用()對(duì)郵件加密。
A.Alice 的公鑰
B.Alice 的私鑰
C.Bob 的公鑰
D.Bob 的私鑰
試題解析與討論:
m.xiexiliangjiufa.com/st/2557019090.html試題參考答案:D
試題
10: 在DES加密算法中,子密鑰的長(zhǎng)度和加密分組的長(zhǎng)度分別是( )。
A.56位和64位
B.48位和64位
C.48位和56位
D.64位和64位
試題解析與討論:
m.xiexiliangjiufa.com/st/3895821970.html試題參考答案:B