2020年信息安全工程師上午綜合知識考前重點(diǎn)試題(四)
1、SM2算法是國家密碼管理局于2010年12月17日發(fā)布的橢圓曲線公鑰密碼算法,在我們國家商用密碼體系中被用來替換( )算法。
A. DES
B. MD5
C. RSA
D. IDEA
查看答案
參考答案:C
2、以下關(guān)于網(wǎng)絡(luò)流量監(jiān)控的敘述中,不正確的是( )。
A.網(wǎng)絡(luò)流量監(jiān)控分析的基礎(chǔ)是協(xié)議行為解析技術(shù)
B.數(shù)據(jù)采集探針是專門用于獲取網(wǎng)絡(luò)鏈路流量數(shù)據(jù)的硬件設(shè)備
C.流量監(jiān)控能夠有效實(shí)現(xiàn)對敏感數(shù)據(jù)的過濾
D.流量監(jiān)測中所監(jiān)測的流量通常采集自主機(jī)節(jié)點(diǎn)、服務(wù)器、路由器接口、鏈路和路徑等
查看答案
參考答案:C
3、 (1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
查看答案
參考答案:D、A、C、B、A
4、 “如果一條鏈路發(fā)生故障,那么只有和該鏈路相連的終端才會受到影響”,這一說法是適合于以下哪一種拓?fù)浣Y(jié)構(gòu)的網(wǎng)絡(luò)的?()
A.星型
B.樹型
C.環(huán)型
D.復(fù)合型
查看答案
參考答案:A
5、Linux系統(tǒng)的運(yùn)行日志存儲的目錄是( )。
A./var/log
B./usr/log
C./etc/log
D./tmp/log
查看答案
參考答案:A
備考刷題推薦:
軟題庫app/信管網(wǎng)app隨時(shí)隨地在線刷題
2020年信息安全工程師55小時(shí)精講直播課程(提供錄播),每節(jié)課都有配套的課后習(xí)題供學(xué)員練習(xí)鞏固所學(xué),首次報(bào)考還送包括歷年真題、試題分類練習(xí)等10種內(nèi)部輔導(dǎo)資料,同時(shí)享有軟題庫免費(fèi)刷題服務(wù)?!?a href="http://m.xiexiliangjiufa.com/aqpeixun.html" target="_blank">點(diǎn)擊了解詳情】
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評論 查看完整評論 | |