信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2021/5/17)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2021/5/17
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2021/5/17)
试题
1: 有线等效保密协议WEP采用RC4流密码技术实现保密性,标准的64位标准流WEP用的密钥和初始向量长度分别是()
A.32位和32位
B.48位和16位
C.56位和8位
D.40位和24位试题解析与讨论:
www.cnitpm.com/st/3272321085.html试题参考答案:D
试题
2: 以下关于认证技术的描述中,错误的是( )。
A.身份认证是用来对信息系统中实体的合法性进行验证的方法
B.消息认证能够验证消息的完整性
C.数字签名是十六进制的字符串
D.指纹识别技术包括验证和识别两个部分
试题解析与讨论:
www.cnitpm.com/st/3893424553.html试题参考答案:C
试题
3:
特洛伊木马攻击的威胁类型属于()
A、授权侵犯威胁
B、渗入威胁
C、植入威胁
D、旁路控制威胁
试题解析与讨论:
www.cnitpm.com/st/284819103.html试题参考答案:C
试题
4:
国家密码管理局于2006年发布了“无线局域网产品须使用的系列密码算法”,其中规定密钥协商算法应使用的是()
A、DH
B、ECDSA
C、ECDH
D、CPK
试题解析与讨论:
www.cnitpm.com/st/284453056.html试题参考答案:C
试题
5: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
试题解析与讨论:
www.cnitpm.com/st/32757467.html试题参考答案:C、B、C、D、A
试题
6: 身份识别在信息安全领域有着广泛的应用,通过识别用户的生理特征来认证用户的身份是安全性很高的身份认证方法。如果把人体特征用于身份识别,则它应该具有不可复制的特点,必须具有()
A.唯一性和保密性
B.唯一性和稳定性
C.保密性和可识别性
D.稳定性和可识别性
试题解析与讨论:
www.cnitpm.com/st/3270312523.html试题参考答案:B
试题
7: 攻击者通过对目标主机进行端口扫描可以直接获得( )。
A.目标主机的操作系统信息
B.目标主机开放端口服务信息
C.目标主机的登录口令
D.目标主机的硬件设备信息
试题解析与讨论:
www.cnitpm.com/st/3897019734.html试题参考答案:B
试题
8: IP地址分为全球地址和专用地址,以下属于专用地址的是( )。
A.192.172.1.2
B. 10.1.2.3
C.168.1.2.3
D.172.168.1.2
试题解析与讨论:
www.cnitpm.com/st/3896521323.html试题参考答案:B
试题
9: SM3密码杂凑算法的消息分组长度为( )比特。
A.64
B.128
C.512
D.1024
试题解析与讨论:
www.cnitpm.com/st/3899024824.html试题参考答案:C
试题
10: 面向数据挖掘的隐私保护技术主要解高层应用中的隐私保护问题,致力于研究如何根据不同数据挖掘操作的特征来实现对隐私的保护,从数据挖的角度,不属于隐私保护技术的是( )。
A.基于数据分析的隐私保护技术
B.基于微据失真的隐私保护技术
C.基于数据匿名化的隐私保护技术
D.基于数据加密的隐私保护技术
试题解析与讨论:
www.cnitpm.com/st/3893114145.html试题参考答案:A