专业信息安全工程师网站|培训机构|服务商(信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2022/9/3)
来源:信管网 2022年09月04日 【所有评论 分享到微信

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2022/9/3)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2022/9/3

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2022/9/3)

  • 试题1

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/st/4115223167.html

  • 试题2

    信息系统安全测评方法中模糊测试是一种黑盒测试技术,它将大量的畸形数据输入到目标程序中,通过监测程序的异常来发现被测程序中可能存在的安全漏洞、关于模糊测试,一下说法错误的是()
    A.与白盒测试相比,具有更好的适用性
    B.模糊测试是一种自动化的动态漏洞挖掘技术,不存在误报,也不需要人工进行大量的逆向分析工作
    C.模糊测试不需要程序的源代码就可以发现问题
    D.模糊测试受限于被测系统的内部实现细节和复杂度

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/326969266.html

  • 试题3

    以下对OSI(开放系统互联)参考模型中数据链路层的功能叙述中,描述最贴切是()
    A、保证数据正确的顺序、无差错和完整
    B、控制报文通过网络的路由选择
    C、提供用户与网络的接口
    D、处理信号通过介质的传输

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/2848820346.html

  • 试题4

    S/Key口令是一种一次性口令生产方案,它可以对抗()
    A、恶意代码木马攻击
    B、拒绝服务攻击
    C、协议分析攻击
    D、重放攻击

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/2845025503.html

  • 试题5

    对信息进行均衡、全面的防护,提高整个系统“安全最低点”的安全性能,这种安全原则被称为(  )。
    A.最小特权原则
    B.木桶原则
    C.等级化原则
    D.最小泄露原则

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/3893514227.html

  • 试题6

    在PKI中,关于RA的功能,描述正确的是(  )。
    A.RA是整个PKI体系中各方都承认的一个值得信赖的、公正的第三方机构
    B.RA负责产生,分配并管理PKI结构下的所有用户的数字证书,把用户的公钥和用户的其他信息绑在一起,在网上验证用户的身份
    C.RA负责证书废止列表CRL的登记和发布
    D.RA负责证书申请者的信息录入,审核以及证书的发放等任务,同时,对发放的证书完成相应的管理功能

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/389837447.html

  • 试题7

    X.509数字证书的内容不包括()。
    A.版本号
    B.签名算法标识
    C.加密算法标识
    D.主体的公开密钥信息

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/327479174.html

  • 试题8

    恶意代码是指为达到恶意目的而专门设计的程序或代码。以下恶意代码中,属于脚本病毒的是 (  )。
    A. Worm. Sasser, f
    B. Trojan. Huigezi. a
    C. Harm. formac. f
    D. Script. Redlof

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/4110512003.html

  • 试题9

    在使用复杂度不高的口令时,容易产生弱口令的安全脆弱性,被攻击者利用从而破解用户账户,下列设置的口令中,()具有最好的口令复杂度。
    A.morrison
    B.Wm.S*F2m5@
    C.27776394
    D.wangjing1977

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/3270512979.html

  • 试题10

    数字水印技术通过在数字化的多媒体数据中嵌入隐蔽的水印标记,可以有效实现对数字多媒体数据的版权保护等功能。数字水印的解释攻击是以阻止版权所有者对所有权的断言为攻击目的。以下不能有效解决解释攻击的方案是()
    A.引入时间戳机制
    B.引入验证码机制
    C.作者在注册水印序列的同时对原作品加以注册
    D.利用单向水印方案消除水印嵌入过程中的可逆性

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/5019022722.html

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章