信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/6/26)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/26
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/6/26)
试题
1:
当审核一个组织的业务连续性计划时,某IS审计师观察到这个被审计组织的数据和软件文件被周期性的进行了备份。有效性计划哪一个特性在这里被证明?()
A.防止
B.减轻
C.恢复
D.响应
试题解析与讨论:
www.cnitpm.com/st/2618023509.html试题参考答案:B
试题
2: Which of the following activities performed by a database administrator (DBA) should be performed by a different person?
A、Deleting database activity logs
B、Implementing database optimization tools
C、Monitoring database usage
D、Defining backup and recovery procedures
试题解析与讨论:
www.cnitpm.com/st/2966911956.html试题参考答案:A
试题
3: An IS auditor conducting an access control review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the IS auditor is MOST likely to conclude that:
A、exposure is greater, since information is available to unauthorized users.
B、operating efficiency is enhanced, since anyone can print any report at any time.
C、operating procedures are more effective, since information is easily available.
D、user friendliness and flexibility is facilitated, since there is a smooth flow of information among users.
试题解析与讨论:
www.cnitpm.com/st/297751107.html试题参考答案:A
试题
4:
应急响应哪一个阶段用来降低事件再次发生的风险()
A.遏制
B.根除
C.跟踪
D.恢复
试题解析与讨论:
www.cnitpm.com/st/261037429.html试题参考答案:C
试题
5:
下面关于IIS报错信息含义的描述正确的是? ()
A、401-找不到文件
B、403-禁止访问
C、404-权限问题
D、500-系统错误
试题解析与讨论:
www.cnitpm.com/st/2643311405.html试题参考答案:B
试题
6: An organization is using an enterprise resource management (ERP) application. Which of the following would be an effective access control?
A、User-level permissions
B、Role-based
C、Fine-grained
D、Discretionary
试题解析与讨论:
www.cnitpm.com/st/294379945.html试题参考答案:B
试题
7:
下面哪种方法产生的密码是最难记忆的?()
A.将用户的生日倒转或是重排
B.将用户的年薪倒转或是重排
C.将用户配偶的名字倒转或是重排
D.用户随机给出的字母
试题解析与讨论:
www.cnitpm.com/st/2721814371.html试题参考答案:D
试题
8:
DDoS攻击的主要目的是:()
A.破坏完整性和机密性
B.破坏可用性
C.破坏机密性和可用性
D.破坏机密性
试题解析与讨论:
www.cnitpm.com/st/2623815006.html试题参考答案:B
试题
9:
张三将微信个人头像换成微信群中某好友头像,并将昵称改为该好友的昵称,然后向该好友的其他好友发送一些欺骗信息。该攻击行为属于以下哪类攻击()?
A、 口令攻击
B、 暴力破解
C、 拒绝服务攻击
D、 社会工程学攻击
试题解析与讨论:
www.cnitpm.com/st/2673528810.html试题参考答案:D
试题
10: 数字签名是对以数字形式储存的消息就行某种处理,产生一种类似于传统手书签名功效的消息处理过程,一个数字签名体制通常包括两个部分,()
A.施加签名和验证签名
B.数字证书和身份认证
C.身份消息加密和解密
D.数字证书和消息摘要试题解析与讨论:
www.cnitpm.com/st/3270223694.html试题参考答案:A