专业信息安全工程师网站|培训机构|服务商(信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 试题库 >> 文章内容
信息安全工程师考试中的英语题难吗(真题带答案版)
来源:信管网 2022年07月05日 【所有评论 分享到微信

信息安全工程师考试科目共有两科:《基础知识》、《应用技术》,一般我们也习惯性称为“综合知识”和“案例分析”。其中《基础知识》为单项选择题,共75道,最后5道题为英语题。《应用技术》为问答题,一般4-5道,每道试题3-4个问题。

考试方式:信息安全工程师考试两科都是采用笔试、闭卷方式进行,在一天内考完,上午考综合知识,下午考案例分析。考试实行全国统一大纲、统一试题、统一时间,两科总分均为75分,合格标准一般为45分。考试成绩不予保留,必须要全部及格才能拿到证书。

信息安全工程师的英语题还是有些难度的,大家可以做一下这5道真题。

The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.

The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.

Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.

Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.

Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.

(71)

A.plaintext

B.ciphertext

C.data

D.hash

(72)

A.stream cipher

B.hash function

C.Message authentication code

D.Block cipher

(73)

A.of

B.for

C.with

D.in

(74)

A.hash

B.stream

C.ciphertext

D.plaintext

(75)

A.collisons

B.image

C.preimage

D.solution

信管网参考答案:

71.A   72.D   73.C   74.B   75.C

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章