专业信息安全工程师网站|培训机构|服务商(2021信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2020/5/15)
来源:信管网 2020年05月18日 【所有评论 分享到微信

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/5/15)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/5/15

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/5/15)

试题1: The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as: 
A、rules. 
B、decision trees. 
C、semantic nets. 
D、dataflow diagrams. 
试题解析与讨论:www.cnitpm.com/st/297063301.html
试题参考答案:B

试题2: A benefit of quality of service (QoS) is that the: 
A、entire network's availability and performance will be significantly improved. 
B、telecom carrier will provide the company with accurate service-level compliance reports. 
C、participating applications will have guaranteed service levels. 
D、communications link will be supported by security controls to perform secure online transactions. 
试题解析与讨论:www.cnitpm.com/st/29515286.html
试题参考答案:C

试题3

下列哪个漏洞不是由于未对输入做过滤造成的?()
A、 DOS攻击
B、 SQL注入
C、 日志注入
D、 命令行注入

试题解析与讨论:www.cnitpm.com/st/2674812408.html
试题参考答案:A

试题4: 网站的安全协议是https时,该网站浏览时会进行()处理。
A.增加访问标记
B.加密
C.身份隐藏
D.口令验证
试题解析与讨论:www.cnitpm.com/st/3269912294.html
试题参考答案:B

试题5: To ensure message integrity, confidentiality and nonrepudiation between two parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against: 
A、the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key by using the receiver's public key. 
B、any part of the message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key using the receiver's public key. 
C、the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering both the encrypted message and digest using the receiver's public key. 
D、the entire message, enciphering the message digest using the sender's private key and enciphering the message using the receiver's public key. 
试题解析与讨论:www.cnitpm.com/st/291706875.html
试题参考答案:A

试题6: The FIRST step in managing the risk of a cyberattack is to: 
A、assess the vulnerability impact. 
B、evaluate the likelihood of threats. 
C、identify critical information assets. 
D、estimate potential damage. 
试题解析与讨论:www.cnitpm.com/st/2928826144.html
试题参考答案:C

试题7: When identifying an earlier project completion time, which is to be obtained by paying a premium for early completion, the activities that should be selected are those: 
A、whose sum of activity time is the shortest. 
B、that have zero slack time. 
C、that give the longest possible completion time. 
D、whose sum of slack time is the shortest. 
试题解析与讨论:www.cnitpm.com/st/2942113311.html
试题参考答案:B

试题8

以下哪一项在防止数据介质被滥用时是不推荐使用的方法:()
A、禁用主机的CD驱动、USB接口等IO 设备
B、对不再使用的硬盘进行严格的数据清除
C、将不再使用的纸质文件用碎纸机粉碎
D、用快速格式化删除存储介质中的保密文件

试题解析与讨论:www.cnitpm.com/st/2739026080.html
试题参考答案:D

试题9: An example of a direct benefit to be derived from a proposed IT-related business investment is: 
A、enhanced reputation. 
B、enhanced staff morale. 
C、the use of new technology. 
D、increased market penetration. 
试题解析与讨论:www.cnitpm.com/st/296405210.html
试题参考答案:D

试题10

以下哪些是需要在信息安全策略中进行描述的:()
A、组织信息系统安全架构
B、信息安全工作的基本原则
C、组织信息安全技术参数
D、组织信息安全实施手段

试题解析与讨论:www.cnitpm.com/st/2745422461.html
试题参考答案:A

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章