软题库 学习课程
当前位置:信管网 >> 在线考试中心 >> 信息安全工程师题库 >> 试题查看
试卷年份2022年下半年
试题题型【单选题】
试题内容

交换机是构成网络的基础设备,主要功能是负责网络通信数据包的交换传输。其中工作于 OSI 的数据链路层,能够识别数据中的 MAC,并根据 MAC 地址选择转发端口的是()
A.第一代交换机
B.第二代交换机
C.第三代交换机
D.第四代交换机

查看答案

相关试题

65题: 随着数据库所处的环境日益开放,所面临的安全威胁也日益增多,其中攻击者假冒用户身份获取数据库系统访问权限的威胁属于( )。
A.旁路控制
B.隐蔽信道
C.口令破解
D.伪装
答案解析与讨论:www.cnitpm.com/st/5741115212.html

66题: 多数数据库系统有公开的默认账号和默认密码,系统密码有些就存储在操作系统中的普通文本文件中,如: Oracle 数据库的内部密码就存储在( )文件中。
A.listener.ora
B.strXXX.cmd
C.key.ora
D.paswrD.cmd
答案解析与讨论:www.cnitpm.com/st/5741226131.html

67题: 数据库系统是一个复杂性高的基础性软件,其安全机制主要有标识与鉴别、访问控制、安全审计、数据加密、安全加固、安全管理等,其中( )可以实现安全角色配置、安全功能管理
A.访问控制
B.安全审计
C.安全加固
D.安全管理
答案解析与讨论:www.cnitpm.com/st/5741314592.html

69题: 以下不属于网络设备提供的 SNMP 访问控制措施的是( )。
A.SNMP权限分级机制
B.限制 SNMP 访问的IP 地址
C.SNMP 访问认证
D.关闭 SNMP 访问
答案解析与讨论:www.cnitpm.com/st/5741518043.html

70题: 网络设备的常见漏洞包括拒绝服务漏洞、旁路、代码执行、溢出、内存破坏等。CVE-2000-0945漏洞显示思科 Catalyst 3500 XL 交换机的Web 配置接口允许远程攻击者不需要认证就执行命令,该漏洞属于( )。
A.拒绝服务漏洞
B.旁路
C.代码执行
D.内存破坏
答案解析与讨论:www.cnitpm.com/st/5741620645.html

71题: Perhaps the most obvious difference between private-key andpublic-key encryption is that the former assumes complete secrecyof all cryptographic keys, whereas the latter requires secrecy foronly the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting thecommunicating parties must somehow be able to share the (71) keywithout allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other overa public channel without compromising security.For partiesshouting across a room or, more realistically , communicating overa public network like a phone line or the nternet, public-keyencryption is the only option.
Another important distinction is that private-key encryption schemesuse the (73) key for both encryption and decryption, whereas publickey encryption schemes use (74) keys for each operation.That is public-key encryption is inherently asymmetri C.This asymmetry in thepublic-key setting means that the roles of sender and receiver are notinterchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectionalcommunication can be achieved in a number of ways; the point is thata single invocation of a public-key encryption scheme forces adistinction between one user who acts as a receiver and other userswho act as senders.)ln addition, a single instance of a (75) encryptionscheme enables multiple senders to communicate privately with asingle receiver,in contrast to the private-key case where a secret keyshared between two parties enables private communication onlybetween those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash
答案解析与讨论:www.cnitpm.com/st/5741716708.html