信息安全工程師當天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/7/5)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/7/5
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2020/7/5)
試題
1:
有關網絡安全的設計原則,以下描述錯誤的是() 。
A.網絡安全強調對信息均衡、全面地進行保護
B.良好的等級劃分,是實現(xiàn)網絡安全的保障
C.網絡安全系統(tǒng)設計不需要考慮網絡結構
D.網絡安全系統(tǒng)應該以不影響系統(tǒng)正常運行為前提
試題解析與討論:
m.xiexiliangjiufa.com/st/2553423748.html試題參考答案:C
試題
2:
分組密碼具有5種工作模式,其是()可用于加密密鑰。
A.電碼本
B.密文反饋
C.輸出反饋
D.計數(shù)器
試題解析與討論:
m.xiexiliangjiufa.com/st/255865498.html試題參考答案:A
試題
3:
“進不來”“拿不走”“看不懂”“改不了”“走不脫”是網絡信息安全建設的目的。其中,“看不懂”是指下面哪種安全服務:()
A.數(shù)據加密
B.身份認證
C.數(shù)據完整性
D.訪問控制
試題解析與討論:
m.xiexiliangjiufa.com/st/2703625594.html試題參考答案:A
試題
4:
以下哪個一個項對“ARP”的解釋是正確的:()
A、Access routing protocol----訪問路由協(xié)議
B、Access routing protocol----訪問解析協(xié)議
C、Address resolution protocol-地址解析協(xié)議
D、Address recovery protocol-地址恢復協(xié)議
試題解析與討論:
m.xiexiliangjiufa.com/st/2653526236.html試題參考答案:C
試題
5: To determine who has been given permission to use a particular system resource, an IS auditor should review:
A、activity lists.
B、access control lists.
C、logon ID lists.
D、password lists.
試題解析與討論:
m.xiexiliangjiufa.com/st/2938711723.html試題參考答案:B
試題
6: Which of the following programs would a sound information security policy MOST likely include to handle suspected intrusions?
A、Response
B、Correction
C、Detection
D、Monitoring
試題解析與討論:
m.xiexiliangjiufa.com/st/2978412207.html試題參考答案:A
試題
7:
以下哪一種人給公司帶來了最大的安全風險?()
A.臨時工
B. 咨詢人員
C. 以前的員工
D.當前的員工
試題解析與討論:
m.xiexiliangjiufa.com/st/272051199.html試題參考答案:D
試題
8: An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls would BEST mitigate the risk of undetected and unauthorized program changes to the production environment?
A、Commands typed on the command line are logged
B、Hash keys are calculated periodically for programs and matched against hash keys calculated for the most recent authorized versions of the programs
C、Access to the operating system command line is granted through an access restriction tool with preapproved rights
D、Software development tools and compilers have been removed from the production environment
試題解析與討論:
m.xiexiliangjiufa.com/st/2915818569.html試題參考答案:B
試題
9:
被以下哪種病毒感染后,會使計算機產生下列現(xiàn)象:系統(tǒng)資源被大量占用,有時會彈出RPC服務終止的對話框,并且系統(tǒng)反復重啟,不能收發(fā)郵件、不能正常復制文件、無法正常瀏覽網頁,復制粘貼等操作受到嚴重影響的,DNS和IIS服務遭到非法拒絕等。()
A、高波變種3T
B、沖擊波
C、震蕩波
D、尼姆達病毒
試題解析與討論:
m.xiexiliangjiufa.com/st/2656414722.html試題參考答案:B
試題
10: As an outcome of information security governance, strategic alignment provides:
A、security requirements driven by enterprise requirements.
B、baseline security following best practices.
C、institutionalized and commoditized solutions.
D、an understanding of risk exposure.
試題解析與討論:
m.xiexiliangjiufa.com/st/295099768.html試題參考答案:A