信息安全工程師當天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/7/22)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/7/22
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內(nèi)容(2020/7/22)
試題
1: A poor choice of passwords and transmission over unprotected communications lines are examples of:
A、vulnerabilities.
B、threats.
C、probabilities.
D、impacts.
試題解析與討論:
m.xiexiliangjiufa.com/st/2961923668.html試題參考答案:A
試題
2:
以下哪項不是信息安全的主要目標()
A.確保業(yè)務連續(xù)性
B.保護信息免受各種威脅的損害
C.防止黑客竊取員工個人信息
D.投資回報和商業(yè)機遇最大化
試題解析與討論:
m.xiexiliangjiufa.com/st/2628225670.html試題參考答案:C
試題
3: The information security policy that states “each individual must have their badge read at every controlled door” addresses which of the following attack methods?
A、Piggybacking
B、Shoulder surfing
C、Dumpster diving
D、Impersonation
試題解析與討論:
m.xiexiliangjiufa.com/st/296081161.html試題參考答案:A
試題
4:
“短信轟炸機”軟件 會對我們的手機造成怎樣的危害( )
A、 短時內(nèi)大量收到垃圾短信,造成手機死機
B、 會使手機發(fā)送帶有惡意鏈接的短信
C、 會損害手機中的SIM卡
D、 會大量發(fā)送垃圾短信,永久損害手機的短信收發(fā)功能
試題解析與討論:
m.xiexiliangjiufa.com/st/2668129387.html試題參考答案:A
試題
5:
甲不但懷疑乙發(fā)給他的被人篡改,而且懷疑乙的公鑰也是被人冒充的,為了消除甲的疑慮,甲和乙決定找一個雙方都信任的第三方來簽發(fā)數(shù)字證書,這個第三方為()
A、國際電信聯(lián)盟電信標準分部(ITU-T)
B、國家安全局(NSA)
C、認證中心(CA)
D、國家標準化組織(ISO)
試題解析與討論:
m.xiexiliangjiufa.com/st/2847915378.html試題參考答案:C
試題
6: 以下不屬于信息安全風險評估中需要識別的對象是()
A.資產(chǎn)識別
B.威脅識別
C.風險識別
D.脆弱性識別
試題解析與討論:
m.xiexiliangjiufa.com/st/327293322.html試題參考答案:C
試題
7: The phases and deliverables of a system development life cycle (SDLC) project should be determined:
A、during the initial planning stages of the project.
B、after early planning has been completed, but before work has begun.
C、throughout the work stages, based on risks and exposures.
D、only after all risks and exposures have been identified and the IS auditor has recommended appropriate controls.
試題解析與討論:
m.xiexiliangjiufa.com/st/2975326108.html試題參考答案:A
試題
8: Which of the following is the MOST likely reason why e-mail systems have become a useful source of evidence for litigation?
A、Multiple cycles of backup files remain available.
B、Access controls establish accountability for e-mail activity.
C、Data classification regulates what information should be communicated via e-mail.
D、Within the enterprise, a clear policy for using e-mail ensures that evidence is available.
試題解析與討論:
m.xiexiliangjiufa.com/st/2970814794.html試題參考答案:A
試題
9:
計算機感染木馬的典型現(xiàn)象是()。
A.有未知程序試圖建立網(wǎng)絡連接
B.收到大量垃圾郵件
C.系統(tǒng)不斷重新啟動
D.藍屏
試題解析與討論:
m.xiexiliangjiufa.com/st/2556318892.html試題參考答案:A
試題
10: Which of the following is an attribute of the control self-assessment (CSA) approach?
A、Broad stakeholder involvement
B、Auditors are the primary control analysts
C、Limited employee participation
D、Policy driven
試題解析與討論:
m.xiexiliangjiufa.com/st/2940228466.html試題參考答案:A