信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2022/4/20)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2022/4/20
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2022/4/20)
试题1
以下关于安全套接层协议(SSL)的叙述中,错误的是()
A、是一种应用层安全协议
B、为TCP/IP连接提供数据加密
C、为TCP/IP连接提供服务器认证
D、提供数据安全机制
查看答案
试题参考答案:A
试题解析与讨论:www.cnitpm.com/st/284953163.html
试题2
在安全评估过程中,采取()手段,可以模拟黑客入侵过程,检测系统安全脆弱性。查看答案
试题参考答案:C
试题3
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
试题参考答案:D、C、A、B、A
试题解析与讨论:www.cnitpm.com/st/389944612.html
试题4
以下关于认证技术的描述中,错误的是( )。查看答案
试题参考答案:C
试题5
攻击者通过对目标主机进行端口扫描,可以直接获得()。查看答案
试题参考答案:D
试题6
密码工作是党和国家的一项特殊重要工作,直接关系国家政治安全、经济安全、国防安全和信息安全。密码法的通过对全面提升密码工作法治化水平起到了关键性作用。密码法规定国家对密码实行分类管理,密码分类中不包含()查看答案
试题参考答案:D
试题解析与讨论:www.cnitpm.com/st/502285.html
试题7
PKI是一种标准的公钥密码的密钥管理平台,数字证书是PKI的基本组成部分。在PKI中,X.509数字证书的内容不包括()。查看答案
试题参考答案:A
试题8
在非安全的通信环境中,为了保证消息来源的可靠性,通常采用的安全防护技术是()查看答案
试题参考答案:C
试题9
以下选项中,不属于生物识别方法的是( )。查看答案
试题参考答案:B
试题10
2018年10月,含有我国SM3杂凑算法的IS0/IEC10118-3: 2018《信息安全技术杂凑函数第3部分:专用杂凑函数》由国际标准化组织(ISO)发布,SM3算法正式成为国际标准。SM3的杂凑值长度为( )。查看答案
试题参考答案:C
温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!
信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。
信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。
发表评论 查看完整评论 | |