信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2021/1/31)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2021/1/31
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2021/1/31)
试题
1: 属于对称加密算法。
A.EIGantal
B.DES
C.MDS
D.RSA
试题解析与讨论:
www.cnitpm.com/st/3269024299.html试题参考答案:B
试题
2:
对于外部组织访问企业信息资产的过程中相关说法不正确的是?()
A.为了信息资产更加安全,禁止外部组织人员访问信息资产。
B.应确保相关信息处理设施和信息资产得到可靠的安全保护。
C.访问前应得到信息资产所有者或管理者的批准。
D.应告知其所应当遵守的信息安全要求。
试题解析与讨论:
www.cnitpm.com/st/2603715993.html试题参考答案:A
试题
3: 以下不属于信息安全风险评估中需要识别的对象是()
A.资产识别
B.威胁识别
C.风险识别
D.脆弱性识别
试题解析与讨论:
www.cnitpm.com/st/327293322.html试题参考答案:C
试题
4:
关于源代码审核,下列说法正确的是:()
A.人工审核源代码审校的效率低,但采用多人并行分析可以完全弥补这个缺点
B.源代码审核通过提供非预期的输入并监视异常结果来发现软件故障,从而定位可能导致安全弱点的薄弱之处
C.使用工具进行源代码审核,速度快,准确率高,已经取代了传统的人工审核
D.源代码审核是对源代码检查分析,检测并报告源代码中可能导致安全弱点的薄弱之处
试题解析与讨论:
www.cnitpm.com/st/2571024220.html试题参考答案:D
试题
5:
下列报告中,不属于信息安全风险评估识别阶段的是()
A、资产价值分析报告
B、风险评估报告
C、威胁分析报告
D、已有安全威胁分析报告
试题解析与讨论:
www.cnitpm.com/st/2848616556.html试题参考答案:B
试题
6: WPKI(无线公开密钥体系)是基于无网络环境的一套遵循既定标准的密钥及证书管理平台,该平台采用的加密算法是( )。
A.SM4
B.优化的RSA加密算法
C.SM9
D.优化的椭圆曲线加密算法
试题解析与讨论:
www.cnitpm.com/st/3897110044.html试题参考答案:D
试题
7: 对于定义在GF(p)上的椭圆曲线,取素数P=11,椭圆曲线y2=x3+x+6mod11,则以下是椭圆曲线11平方剩余的是( )。
A.x=1
B.x=3
C.x=6
D.x=9
试题解析与讨论:
www.cnitpm.com/st/3898520398.html试题参考答案:B
试题
8: 2017年11月,在德国柏林召开的第55次ISO/IEC信息安全分技术委员会(SC27)会议上,我国专家组提出的( )算法一致通过成为国际标准。
A.SM2与SM3
B.SM3与SM4
C.SM4与SM9
D.SM9与SM2
试题解析与讨论:
www.cnitpm.com/st/3895519670.html试题参考答案:D
试题
9:
干管灭火器系统使用()
A.水,但是只有在发现火警以后水才进入管道
B. 水,但是水管中有特殊的防水剂
C.CO2代替水
D.哈龙代替水
试题解析与讨论:
www.cnitpm.com/st/2608711453.html试题参考答案:A
试题
10: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
试题解析与讨论:
www.cnitpm.com/st/32757467.html试题参考答案:C、B、C、D、A