信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class27-6-1.aspx
信息安全工程师每日一练试题(2019/5/8)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2019/5/8
信息安全工程师每日一练试题内容(2019/5/8)
试题
1:
安全管理是信息系统安全能动性的组成部分,它贯穿于信息系统规划、设计、运行和维护的各阶段。安全管理中的介质安全属于( )。
A.技术安全
B.管理安全
C.物理安全
D.环境安全
试题解析与讨论:
www.cnitpm.com/st/352122.html试题参考答案:C
试题
2:
WindowsNT和Windows2000系统能设置为在若干次无效登录后锁定账号,此技术可以防止( )。
A、暴力攻击
B、木马病毒
C、缓存溢出攻击
D、IP欺骗
试题解析与讨论:
www.cnitpm.com/st/787271.html试题参考答案:A
试题
3:
“冲击波”病毒属于 (1) 类型的病毒,它利用 Windows 操作系统的 (2) 漏 洞进行快速传播。
(1)A、蠕虫
B、文件
C、引导区
D、邮件
(2)A、CGI 脚本
B、RPC
C、DNS
D、IMAP
试题解析与讨论:
www.cnitpm.com/st/78802713.html试题参考答案:A、B
试题
4:
安全电子邮件使用( )协议。
A、PGP
B、HTTPS
C、MIME
D、DES
试题解析与讨论:
www.cnitpm.com/st/92793195.html试题参考答案:A
试题
5:
()把整个软件开发流程分成多个阶段,每一个阶段都由目标设定、风险分析、开发和有效性验证以及评审构成。
A.原型模型
B.瀑布模型
C.螺旋模型
D. V模型
试题解析与讨论:
www.cnitpm.com/st/1266928914.html试题参考答案:C
试题
6:
某服务器软件系统对可用性(Availability),性能( Performance )和可修改性 (Modification)的要求较高,(1)设计策略能提高该系统的可用性,(2)设计策略能够提高该系统的性能,(3)设计策略能够提高该系统的可修改性。
(1)A.Ping/Echo
B.限制访问
C.运行时注册
D.接口-实现分离
(2)A.分层结构
B.事务机制
C.主动兀余
D.队列调度
(3)A.信息隐藏
B.记录/回放
C.任务模型
D.回滚
试题解析与讨论:
www.cnitpm.com/st/1269025300.html试题参考答案:A、D、A
试题
7: 包过滤型防火墙作为比较简单的防火墙,主要机制是检查出入数据包()地址。
A、物理层
B、网络层
C、数据链路层
D、应用层
试题解析与讨论:
www.cnitpm.com/st/1272529760.html试题参考答案:B
试题
8: 逆向工程导出的信息可以分为实现级、结构级、功能级和领域级四个抽象层次。程序的抽象语法树属于(1);反映程序分量之间相互依赖关系的信息属于(2)。
(1)A.实现级
B.结构级
C.功能级
D.领域级
(2)A.实现级
B.结构级
C.功能级
D.领域级
试题解析与讨论:
www.cnitpm.com/st/1884323217.html试题参考答案:A、B
试题
9:
甲和乙要进行通信,甲对发送的消息附加了数字签名,乙收到该消息后利用()验证该消息的真实性。
A.甲的公钥
B.甲的私钥
C.乙的公钥
D.乙的私钥
试题解析与讨论:
www.cnitpm.com/st/2473913350.html试题参考答案:A
试题
10: The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the (71) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (72), one also has to decide whether to use a two-tier, three-tier,or n-tier architecture. Then the requirements and the architecture design are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (73) specify the operating environment(s) in which the system must perform and how those may change over time. (74) focus on the nonfunctional requirements issues such as response time,capacity,and reliability. (75) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used.
(71)A.functional requirements
B.nonfunctional requirements
C.system constraint
D.system operational environment
(72)A.client-based architecture
B.server-based architecture
C.network architecture
D.client-server architecture
(73)A.Operational requirements
B.Speed requirement
C.Access control requirements
D.Customization requirements
(74)A.Environment requirements
B.Maintainability requirements
C.Performance requirements
D.Virus control requirements
(75)A.Safety requirements
B.Security requirements
C.Data management requirements
D.System requirements
试题解析与讨论:
www.cnitpm.com/st/3936428375.html试题参考答案:B、D、A、C、B