信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/6/9)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/9
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/6/9)
试题
1: During maintenance of a relational database, several values of the foreign key in a transaction table of a relational database have been corrupted. The consequence is that:
A、the detail of involved transactions may no longer be associated with master data, causing errors when these transactions are processed.
B、there is no way of reconstructing the lost information, except by deleting the dangling tuples and reentering the transactions.
C、the database will immediately stop execution and lose more information.
D、the database will no longer accept input data.
试题解析与讨论:
www.cnitpm.com/st/2985510469.html试题参考答案:A
试题
2:
灾难性恢复计划 (DRP) 基于:()
A.技术方面的业务连续性计划
B.操作部分的业务连续性计划
C.功能方面的业务连续性计划
D.总体协调的业务连续性计划
试题解析与讨论:
www.cnitpm.com/st/2613925656.html试题参考答案:A
试题
3: An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the:
A、hardware configuration.
B、access control software.
C、ownership of intellectual property.
D、application development methodology.
试题解析与讨论:
www.cnitpm.com/st/2946811872.html试题参考答案:C
试题
4:
近代密码学比古典密码学本质上的进步是什么?()
A、保密是基于密钥而不是密码算法
B、采用了非对称密钥算法
C、加密的效率大幅提升
D、虚拟专用网络(VPN)的应用。
试题解析与讨论:
www.cnitpm.com/st/2735711820.html试题参考答案:A
试题
5: The MOST important success factor in planning a penetration test is:
A、the documentation of the planned testing procedure.
B、scheduling and deciding on the timed length of the test.
C、the involvement of the management of the client organization.
D、the qualifications and experience of staff involved in the test.
试题解析与讨论:
www.cnitpm.com/st/295378681.html试题参考答案:C
试题
6:
以下哪项是对抗ARP欺骗有效的手段?()
A.使用静态的ARP 缓存
B.在网络上阻止ARP报文的发送
C.安装杀毒软件并更新到最新的病毒库
D.使用Linux系统提高安全性
试题解析与讨论:
www.cnitpm.com/st/268523342.html试题参考答案:A
试题
7:
划分VLAN主要解决什么问题?()
A、隔离广播
B、解决安全性
C、隔离故障域
D、解决带宽问题
试题解析与讨论:
www.cnitpm.com/st/27271591.html试题参考答案:A
试题
8:
下面各种加密算法中属于双钥制加密算法的是()。
A.RSA
B.LUC
C.DES
D.DSA
试题解析与讨论:
www.cnitpm.com/st/2552426128.html试题参考答案:A
试题
9: The GREATEST advantage of using web services for the exchange of information between two systems is:
A、secure communications.
B、improved performance.
C、efficient interfacing.
D、enhanced documentation.
试题解析与讨论:
www.cnitpm.com/st/2951413545.html试题参考答案:C
试题
10:
U盘里有重要资料,同事临时借用,如何做更安全?()
A、 同事关系较好可以借用
B、 删除文件之后再借
C、 同事使用U盘的过程中,全程查看
D、 将U盘中的文件备份到电脑之后,使用杀毒软件提供的“文件粉碎”功能将文件粉碎,然后再借给同事
试题解析与讨论:
www.cnitpm.com/st/2666417939.html试题参考答案:D