信息安全工程師當天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/11/23)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2020/11/23
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內(nèi)容(2020/11/23)
試題
1: 一個密碼系統(tǒng)如果用E表示加密運算,D表示解密運算,M表示明文,C表示密文,則下面描述必然成立的是( )。
A. E(E(M))=C
B. D(E(M))=M
C. D(E(M))=C
D. D(D(M))=M
試題解析與討論:
m.xiexiliangjiufa.com/st/389293064.html試題參考答案:B
試題
2: 按照密碼系統(tǒng)對明文的處理方法,密碼系統(tǒng)可以分為( )。
A.對稱密碼系統(tǒng)和公鑰密碼系統(tǒng)
B.對稱密碼系統(tǒng)和非對稱密碼系統(tǒng)
C.數(shù)據(jù)加密系統(tǒng)和數(shù)字簽名系統(tǒng)
D.分組密碼系統(tǒng)和序列密碼系統(tǒng)
試題解析與討論:
m.xiexiliangjiufa.com/st/3893815370.html試題參考答案:D
試題
3:
下列哪一項能夠提高網(wǎng)絡的可用性?()
A.數(shù)據(jù)冗余
B.鏈路冗余
C.軟件冗余
D.電源冗余
試題解析與討論:
m.xiexiliangjiufa.com/st/260678648.html試題參考答案:B
試題
4: 對日志數(shù)據(jù)進行審計檢查,屬于()類控制措施。
A.預防
B.檢查
C.威懾
D.修正
試題解析與討論:
m.xiexiliangjiufa.com/st/3270715804.html試題參考答案:B
試題
5: 密碼分析者針對加解密算法的數(shù)學基礎和某些密碼學特性,根據(jù)數(shù)學方法破譯密碼的攻擊方式稱為( )。
A.數(shù)學分析攻擊
B.差分分析攻擊
C.基于物理的攻擊
D.窮舉攻擊
試題解析與討論:
m.xiexiliangjiufa.com/st/3892725663.html試題參考答案:A
試題
6: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
試題解析與討論:
m.xiexiliangjiufa.com/st/32757467.html試題參考答案:C、B、C、D、A
試題
7:
射頻識別(RFID)標簽容易受到以下哪種風險?()
A.進程劫持
B.竊聽
C.惡意代碼
D.Phishing
試題解析與討論:
m.xiexiliangjiufa.com/st/2609025800.html試題參考答案:B
試題
8:
以下有關信息安全管理員職責的敘述,不正確的是()
A、信息安全管理員應該對網(wǎng)絡的總體安全布局進行規(guī)劃
B、信息安全管理員應該對信息系統(tǒng)安全事件進行處理
C、信息安全管理員應該負責為用戶編寫安全應用程序
D、信息安全管理員應該對安全設備進行優(yōu)化配置
試題解析與討論:
m.xiexiliangjiufa.com/st/2844417488.html試題參考答案:C
試題
9: SM4是一種分組密碼算法,其分組長度和密鑰長度分別為()。
A.64位和128位
B.128位和128位
C.128位和256位
D.256位和256位
試題解析與討論:
m.xiexiliangjiufa.com/st/3275126410.html試題參考答案:B
試題
10:
數(shù)字簽名最常見的實現(xiàn)方法是建立在()的組合基礎之上
A、公鑰密碼體制和對稱密碼體制
B、對稱密碼體制和MD5摘要算法
C、公鑰密碼體制和單向安全散列函數(shù)算法
D、公證系統(tǒng)和MD4摘要算法
試題解析與討論:
m.xiexiliangjiufa.com/st/2845924106.html試題參考答案:C