专业信息安全工程师网站|培训机构|服务商(2021信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2021/11/6)
来源:信管网 2021年11月07日 【所有评论 分享到微信

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2021/11/6)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2021/11/6

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2021/11/6)

试题1

67mod119的逆元是()
A、52
B、67
C、16
D、19

试题解析与讨论:www.cnitpm.com/st/2851225294.html
试题参考答案:C

试题2: 计算机取证主要是对电子证据的获取、分析、归档和描述的过程,而电子证据需要在法庭上作为证据展示,进行计算机取证时应当充分考虑电子证据的真实性和电子证据的证明力,除了相关准备之外,计算机取证步骤通常不包括()
A.保护目标计算机系统
B.确定电子证据
C.收集电子数据、保全电子证据
D.清除恶意代码试题解析与讨论:www.cnitpm.com/st/326941650.html
试题参考答案:D

试题3: 无论是哪一种Web服务器,都会受到HTTP协议本身安全问题的困扰,这样的信息系统安全漏洞属于(  )。
A.开发型漏洞
B.运行型漏洞
C.设计型漏洞
D.验证型漏洞
试题解析与讨论:www.cnitpm.com/st/4112713490.html
试题参考答案:C

试题4: 工控系统广泛应用于电力、石化、医药、航天等领域,已经成为国家关键基础设施的重要组成部分。作为信息基础设施的基础,电力工控系统安全面临的主要威胁不包括()
A.内部人为风险
B.黑客攻击
C.设备损耗
D.病毒破坏试题解析与讨论:www.cnitpm.com/st/327068465.html
试题参考答案:C

试题5: 密码分析者针对加解密算法的数学基础和某些密码学特性,根据数学方法破译密码的攻击方式称为(  )。
A.数学分析攻击
B.差分分析攻击
C.基于物理的攻击
D.穷举攻击
试题解析与讨论:www.cnitpm.com/st/3892725663.html
试题参考答案:A

试题6: 如果破译加密算法所需要的计算能力和计算时间是现实条件所不具备的,那么就认为相应的密码体制是(  )。
A.实际安全
B.可证明安全
C.无条件安全
D.绝对安全
试题解析与讨论:www.cnitpm.com/st/3899110708.html
试题参考答案:A

试题7: 对于提高人员安全意识和安全操作技能来说,以下所列的安全管理方法最有效的是 (  )。
A、安全检查
B、安全教育和安全培训
C、安全责任追究
D、安全制度约束
试题解析与讨论:www.cnitpm.com/st/4108914134.html
试题参考答案:B

试题8

以下关于隧道技术说法不正确的是()
A、隧道技术可以用来解决TCP/IP协议的某种安全威胁问题
B、隧道技术的本质是用一种协议来传输另外一种协议
C、IPSec协议中不会使用隧道技术
D、虚拟专用网中可以采用隧道技术

试题解析与讨论:www.cnitpm.com/st/2850118239.html
试题参考答案:C

试题9: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisions
B.image
C.preimage
D.solution
试题解析与讨论:www.cnitpm.com/st/4115223167.html
试题参考答案:A、D、C、B、A

试题10: 利用公开密钥算法进行数据加密时,采用的方式是(  )。
A.发送方用公开密钥加密,接收方用公开密钥解密
B.发送方用私有密钥加密,接收方用私有密钥解密
C.发送方用公开密钥加密,接收方用私有密钥解密
D.发送方用私有密钥加密,接收方用公开密钥解
试题解析与讨论:www.cnitpm.com/st/3899312903.html
试题参考答案:C

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章