信息安全工程師當天每日一練試題地址:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.xiexiliangjiufa.com/class/27/e6_1.html
信息安全工程師每日一練試題(2021/1/31)在線測試:m.xiexiliangjiufa.com/exam/ExamDay.aspx?t1=6&day=2021/1/31
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2021/1/31)
試題
1: 屬于對稱加密算法。
A.EIGantal
B.DES
C.MDS
D.RSA
試題解析與討論:
m.xiexiliangjiufa.com/st/3269024299.html試題參考答案:B
試題
2:
對于外部組織訪問企業(yè)信息資產(chǎn)的過程中相關說法不正確的是?()
A.為了信息資產(chǎn)更加安全,禁止外部組織人員訪問信息資產(chǎn)。
B.應確保相關信息處理設施和信息資產(chǎn)得到可靠的安全保護。
C.訪問前應得到信息資產(chǎn)所有者或管理者的批準。
D.應告知其所應當遵守的信息安全要求。
試題解析與討論:
m.xiexiliangjiufa.com/st/2603715993.html試題參考答案:A
試題
3: 以下不屬于信息安全風險評估中需要識別的對象是()
A.資產(chǎn)識別
B.威脅識別
C.風險識別
D.脆弱性識別
試題解析與討論:
m.xiexiliangjiufa.com/st/327293322.html試題參考答案:C
試題
4:
關于源代碼審核,下列說法正確的是:()
A.人工審核源代碼審校的效率低,但采用多人并行分析可以完全彌補這個缺點
B.源代碼審核通過提供非預期的輸入并監(jiān)視異常結果來發(fā)現(xiàn)軟件故障,從而定位可能導致安全弱點的薄弱之處
C.使用工具進行源代碼審核,速度快,準確率高,已經(jīng)取代了傳統(tǒng)的人工審核
D.源代碼審核是對源代碼檢查分析,檢測并報告源代碼中可能導致安全弱點的薄弱之處
試題解析與討論:
m.xiexiliangjiufa.com/st/2571024220.html試題參考答案:D
試題
5:
下列報告中,不屬于信息安全風險評估識別階段的是()
A、資產(chǎn)價值分析報告
B、風險評估報告
C、威脅分析報告
D、已有安全威脅分析報告
試題解析與討論:
m.xiexiliangjiufa.com/st/2848616556.html試題參考答案:B
試題
6: WPKI(無線公開密鑰體系)是基于無網(wǎng)絡環(huán)境的一套遵循既定標準的密鑰及證書管理平臺,該平臺采用的加密算法是( )。
A.SM4
B.優(yōu)化的RSA加密算法
C.SM9
D.優(yōu)化的橢圓曲線加密算法
試題解析與討論:
m.xiexiliangjiufa.com/st/3897110044.html試題參考答案:D
試題
7: 對于定義在GF(p)上的橢圓曲線,取素數(shù)P=11,橢圓曲線y2=x3+x+6mod11,則以下是橢圓曲線11平方剩余的是( )。
A.x=1
B.x=3
C.x=6
D.x=9
試題解析與討論:
m.xiexiliangjiufa.com/st/3898520398.html試題參考答案:B
試題
8: 2017年11月,在德國柏林召開的第55次ISO/IEC信息安全分技術委員會(SC27)會議上,我國專家組提出的( )算法一致通過成為國際標準。
A.SM2與SM3
B.SM3與SM4
C.SM4與SM9
D.SM9與SM2
試題解析與討論:
m.xiexiliangjiufa.com/st/3895519670.html試題參考答案:D
試題
9:
干管滅火器系統(tǒng)使用()
A.水,但是只有在發(fā)現(xiàn)火警以后水才進入管道
B. 水,但是水管中有特殊的防水劑
C.CO2代替水
D.哈龍代替水
試題解析與討論:
m.xiexiliangjiufa.com/st/2608711453.html試題參考答案:A
試題
10: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
試題解析與討論:
m.xiexiliangjiufa.com/st/32757467.html試題參考答案:C、B、C、D、A