专业信息安全工程师网站|培训机构|服务商(2021信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2021/6/16)
来源:信管网 2021年06月17日 【所有评论 分享到微信

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2021/6/16)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2021/6/16

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2021/6/16)

试题1

甲收到一份来自乙的电子订单后,将订单中的货物送达到乙时,乙否认自己曾经发送过这份订单,为了解除这种纷争,采用的安全技术是()
A、数字签名技术
B、数字证书
C、消息认证码
D、身份认证技术

试题解析与讨论:www.cnitpm.com/st/284833063.html
试题参考答案:A

试题2: ISO制定的安全体系结构描述了5种安全服务,以下不属于这5种安全服务的是()
A.鉴别服务
B.数据报过滤
C.访问控制
D.数据完整性
试题解析与讨论:www.cnitpm.com/st/3270424021.html
试题参考答案:B

试题3

WI-FI网络安全接入是一种保护无线网络安全的系统,WPA加密模式不包括()
A、WPA和WPA2
B、WPA-PSK
C、WEP
D、WPA2-PSK

试题解析与讨论:www.cnitpm.com/st/284804709.html
试题参考答案:C

试题4

    There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
    Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB  is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.

(1)A.message  B、information  C、requests  D、data
(2)A.methods  B、cases       C、hands    D、sections
(3)A.bad      B、real        C、fake      D、new
(4)A.user     B、administrator  C、editor   D、attacker
(5)A.or       B、of          C、in        D、to
试题解析与讨论:www.cnitpm.com/st/32757467.html
试题参考答案:C、B、C、D、A

试题5: 以下关于数字证书的叙述中,错误的是(  )。
A.证书通常携带CA的公开密钥
B.证书携带持有者的签名算法标识
C.证书的有效性可以通过验证持有者的签名验证
D.证书通常由CA安全认证中心发放
试题解析与讨论:www.cnitpm.com/st/389547738.html
试题参考答案:A

试题6

(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less

试题解析与讨论:www.cnitpm.com/st/2851420507.html
试题参考答案:D、A、C、B、A

试题7

安全专家在对某网站进行安全部署时,调整了Apache 的运行权限,从root 权限降低为nobody 用户,以下操作的主要目的是:()
A.为了提高Apache 软件运行效率
B.为了提高Apache 软件的可靠性
C.为了避免攻击者通过Apache 获得root 权限
D.为了减少Apache 上存在的漏洞

试题解析与讨论:www.cnitpm.com/st/257024920.html
试题参考答案:C

试题8: 无线传感器网络容易受到各种恶意攻击,以下关于其防御手段说法错误的是()。
A.采用干扰区内节点切换频率的方式抵御干扰
B.通过向独立多路径发送验证数据来发现异常节点
C.利用中心节点监视网络中其它所有节点来发现恶意节点
D.利用安全并具有弹性的时间同步协议对抗外部攻击和被俘获节点的影响
试题解析与讨论:www.cnitpm.com/st/3274326177.html
试题参考答案:C

试题9

来自终端的电磁泄露风险,因为它们:()
A.导致噪音污染
B. 破坏处理程序
C. 产生危险水平的电流
D. 可以被捕获并还原

试题解析与讨论:www.cnitpm.com/st/2608920248.html
试题参考答案:D

试题10

下面哪种方法在数据中心灭火最有效并且是环保的?()
A.哈龙气体
B.湿管
C.干管
D.二氧化碳气

试题解析与讨论:www.cnitpm.com/st/2608516073.html
试题参考答案:A

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章