信息安全工程师当天每日一练试题地址:http://www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:http://www.cnitpm.com/class27-6-1.aspx
信息安全工程师每日一练试题(2017/11/23)在线测试:http://www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2017/11/23
信息安全工程师每日一练试题内容(2017/11/23)
试题
1:
适用浏览器上网时,不影响系统和个人信息安全的是 ( ) 。
A、浏览包含有病毒的网站
B、浏览器显示网页文字的字体大小
C、在网站上输入银行帐号、口令等敏感信息
D、下载和安装互联网上的软件或者程序
试题解析与讨论:
http://www.cnitpm.com/st/49491704.html试题参考答案:B
试题
2:
TCP/IP 在多个层引入了安全机制,其中 TLS 协议位于 ( ) 。
A、数据链路层
B、网络层
C、传输层
D、应用层
试题解析与讨论:
http://www.cnitpm.com/st/81002789.html试题参考答案:C
试题
3:
下面关于漏洞扫描系统的叙述,错误的是 ( ) 。
A、漏洞扫描系统是一种自动检测目标主机安全弱点的程序
B、黑客利用漏洞扫描系统可以发现目标主机的安全漏洞
C、漏洞扫描系统可以用于发现网络入侵者
D、漏洞扫描系统的实现依赖于系统漏洞库的完善
试题解析与讨论:
http://www.cnitpm.com/st/81552808.html试题参考答案:C
试题
4: 在 Mysql的授权表中,记录各个帐号在各个数据库上的操作权限的权限表是()。
A、db权限表
B、host权限表
C、table_priv权限表
D、 user权限表
试题解析与讨论:
http://www.cnitpm.com/st/2145011415.html试题参考答案:A
试题
5: 公钥与私钥总是成对出现的()
A、是
B、否
试题解析与讨论:
http://www.cnitpm.com/st/2434210507.html试题参考答案:A
试题
6:
当涉及到信息算计系统犯罪取证时,应与哪个部门取得联系?()
A.监管机构
B.重要客户
C.供应商
D.政府部门
试题解析与讨论:
http://www.cnitpm.com/st/2603115713.html试题参考答案:D
试题
7: A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy:
A、payroll reports should be compared to input forms.
B、gross payroll should be recalculated manually.
C、checks (cheques) should be compared to input forms.
D、checks (cheques) should be reconciled with output reports.
试题解析与讨论:
http://www.cnitpm.com/st/292099409.html试题参考答案:A
试题
8: Which of the following controls would an IS auditor look for in an environment where duties cannot be appropriately segregated?
A、Overlapping controls
B、Boundary controls
C、Access controls
D、Compensating controls
试题解析与讨论:
http://www.cnitpm.com/st/2953814280.html试题参考答案:D
试题
9: An IS auditor attempting to determine whether access to program documentation is restricted to authorized persons would MOST likely:
A、evaluate the record retention plans for off-premises storage.
B、interview programmers about the procedures currently being followed.
C、compare utilization records to operations schedules.
D、review data file access records to test the librarian function.
试题解析与讨论:
http://www.cnitpm.com/st/297153938.html试题参考答案:B
试题
10: The phases and deliverables of a system development life cycle (SDLC) project should be determined:
A、during the initial planning stages of the project.
B、after early planning has been completed, but before work has begun.
C、throughout the work stages, based on risks and exposures.
D、only after all risks and exposures have been identified and the IS auditor has recommended appropriate controls.
试题解析与讨论:
http://www.cnitpm.com/st/2975326108.html试题参考答案:A