信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2023/3/13)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2023/3/13
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2023/3/13)
试题1
下列报告中,不属于信息安全风险评估识别阶段的是()
A、资产价值分析报告
B、风险评估报告
C、威胁分析报告
D、已有安全威胁分析报告
查看答案
试题参考答案:B
试题2
计算机病毒是指一种能够通过自身复制传染,起破坏作用的计算机程序,目前使用的防杀病毒软件的主要作用是( )。查看答案
试题参考答案:D
试题解析与讨论:www.cnitpm.com/st/389643226.html
试题3
2017年6月1日,()开始施行。查看答案
试题参考答案:C
试题解析与讨论:www.cnitpm.com/st/32754695.html
试题4
SM4算法是国家密码管理局于2012年3月21日发布的一种分组密码算法,在我国商用密码体系中,SM4主要用于数据加密。SM4算法的分组长度和密钥长度分别为().查看答案
试题参考答案:B
试题5
(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
查看答案
试题参考答案:D、A、C、B、A
试题6
能力成熟度模型(CMM)是对一个组织机构的能力进行成熟度评估的模型,成熟度级别一般分为五级:1级-非正式执行,2级-计划跟踪,3级-充分定义,4级-量化控制,5级-持续优化。在软件安全能力成熟度模型中,漏洞评估过程属于( )查看答案
试题参考答案:C
试题7
设在RSA的公钥密码体制中,公钥为(e,n)=(7,55),则私钥d=( )。查看答案
试题参考答案:D
试题解析与讨论:www.cnitpm.com/st/38988572.html
试题8
以下不属于网络安全控制技术的是()
A、防火墙技术
B、访问控制
C、入侵检测技术
D、差错控制
查看答案
试题参考答案:D
试题9
下列关于数字签名的说法正确的是()查看答案
试题参考答案:D
试题10
下列关于公钥体制中说法不正确的是()查看答案
试题参考答案:B
信管网订阅号
信管网视频号
信管网抖音号
温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!
信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。
信管网软考课程由信管网依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。
发表评论 查看完整评论 | |