信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/5/15)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/5/15
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/5/15)
试题
1: The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as:
A、rules.
B、decision trees.
C、semantic nets.
D、dataflow diagrams.
试题解析与讨论:
www.cnitpm.com/st/297063301.html试题参考答案:B
试题
2: A benefit of quality of service (QoS) is that the:
A、entire network's availability and performance will be significantly improved.
B、telecom carrier will provide the company with accurate service-level compliance reports.
C、participating applications will have guaranteed service levels.
D、communications link will be supported by security controls to perform secure online transactions.
试题解析与讨论:
www.cnitpm.com/st/29515286.html试题参考答案:C
试题
3:
下列哪个漏洞不是由于未对输入做过滤造成的?()
A、 DOS攻击
B、 SQL注入
C、 日志注入
D、 命令行注入
试题解析与讨论:
www.cnitpm.com/st/2674812408.html试题参考答案:A
试题
4: 网站的安全协议是https时,该网站浏览时会进行()处理。
A.增加访问标记
B.加密
C.身份隐藏
D.口令验证
试题解析与讨论:
www.cnitpm.com/st/3269912294.html试题参考答案:B
试题
5: To ensure message integrity, confidentiality and nonrepudiation between two parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against:
A、the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key by using the receiver's public key.
B、any part of the message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key using the receiver's public key.
C、the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering both the encrypted message and digest using the receiver's public key.
D、the entire message, enciphering the message digest using the sender's private key and enciphering the message using the receiver's public key.
试题解析与讨论:
www.cnitpm.com/st/291706875.html试题参考答案:A
试题
6: The FIRST step in managing the risk of a cyberattack is to:
A、assess the vulnerability impact.
B、evaluate the likelihood of threats.
C、identify critical information assets.
D、estimate potential damage.
试题解析与讨论:
www.cnitpm.com/st/2928826144.html试题参考答案:C
试题
7: When identifying an earlier project completion time, which is to be obtained by paying a premium for early completion, the activities that should be selected are those:
A、whose sum of activity time is the shortest.
B、that have zero slack time.
C、that give the longest possible completion time.
D、whose sum of slack time is the shortest.
试题解析与讨论:
www.cnitpm.com/st/2942113311.html试题参考答案:B
试题
8:
以下哪一项在防止数据介质被滥用时是不推荐使用的方法:()
A、禁用主机的CD驱动、USB接口等IO 设备
B、对不再使用的硬盘进行严格的数据清除
C、将不再使用的纸质文件用碎纸机粉碎
D、用快速格式化删除存储介质中的保密文件
试题解析与讨论:
www.cnitpm.com/st/2739026080.html试题参考答案:D
试题
9: An example of a direct benefit to be derived from a proposed IT-related business investment is:
A、enhanced reputation.
B、enhanced staff morale.
C、the use of new technology.
D、increased market penetration.
试题解析与讨论:
www.cnitpm.com/st/296405210.html试题参考答案:D
试题
10:
以下哪些是需要在信息安全策略中进行描述的:()
A、组织信息系统安全架构
B、信息安全工作的基本原则
C、组织信息安全技术参数
D、组织信息安全实施手段
试题解析与讨论:
www.cnitpm.com/st/2745422461.html试题参考答案:A