信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/6/18)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/18
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/6/18)
试题
1: A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?
A、Comparing source code
B、Reviewing system log files
C、Comparing object code
D、Reviewing executable and source code integrity
试题解析与讨论:
www.cnitpm.com/st/2957425693.html试题参考答案:B
试题
2:
电子邮件客户端通常需要用()协议来发送邮件。
A.仅SMTP
B.仅POP
C.SMTP 和POP
D.以上都不正确
试题解析与讨论:
www.cnitpm.com/st/2682923626.html试题参考答案:A
试题
3: 对于定义在GF(p)上的椭圆曲线,取素数P=11,椭圆曲线y2=x3+x+6mod11,则以下是椭圆曲线11平方剩余的是( )。
A.x=1
B.x=3
C.x=6
D.x=9
试题解析与讨论:
www.cnitpm.com/st/3898520398.html试题参考答案:B
试题
4: Functionality is a characteristic associated with evaluating the quality of software products throughout their life cycle, and is BEST described as the set of attributes that bear on the:
A、existence of a set of functions and their specified properties.
B、ability of the software to be transferred from one environment to another.
C、capability of software to maintain its level of performance under stated conditions.
D、relationship between the performance of the software and the amount of resources used.
试题解析与讨论:
www.cnitpm.com/st/292326558.html试题参考答案:A
试题
5: In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model?
A、Optimized
B、Managed
C、Defined
D、Repeatable
试题解析与讨论:
www.cnitpm.com/st/292603206.html试题参考答案:B
试题
6: 密码体制是一种代表性的古典密码算法,在凯撒密码体制中,设置密钥参数k = 3,
依次对密文“zhonggguo”进行加密,则相应的密文为()
A.ckrqjjxr
B.cdrqjjxr
C.Akrqjjxr
D.Ckrqiixr试题解析与讨论:
www.cnitpm.com/st/3269123998.html试题参考答案:A
试题
7: Integrating business continuity planning (BCP) into an IT project aids in:
A、the retrofitting of the business continuity requirements.
B、the development of a more comprehensive set of requirements.
C、the development of a transaction flowchart.
D、ensuring the application meets the user's needs.
试题解析与讨论:
www.cnitpm.com/st/297596764.html试题参考答案:B
试题
8:
基本的计算机安全需求不包括下列哪一条:()
A.安全策略和标识
B.绝对的保证和持续的保护
C. 身份鉴别和落实责任
D. 合理的保证和连续的保护
试题解析与讨论:
www.cnitpm.com/st/2588428880.html试题参考答案:B
试题
9:
若 Bob 给 Alice 发送一封邮件,并想让 Alice 确信邮件是由 Bob 发出的,则 Bob 应该选用()对邮件加密。
A.Alice 的公钥
B.Alice 的私钥
C.Bob 的公钥
D.Bob 的私钥
试题解析与讨论:
www.cnitpm.com/st/2557019090.html试题参考答案:D
试题
10: 在DES加密算法中,子密钥的长度和加密分组的长度分别是( )。
A.56位和64位
B.48位和64位
C.48位和56位
D.64位和64位
试题解析与讨论:
www.cnitpm.com/st/3895821970.html试题参考答案:B