信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2023/11/4)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2023/11/4
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2023/11/4)
试题1
智能卡的片内操作系统COS —般由通信管理模块、安全管理模块、应用管理模块和文件管理模块四个部分组成。其中数据单元或记录的存储属于 ( )。查看答案
试题参考答案:D
试题解析与讨论:www.cnitpm.com/st/411119722.html
试题2
数据库系统是一个复杂性高的基础性软件,其安全机制主要有标识与鉴别访问控制、安全审计、数据加密、安全加固、安全管理等,其中( )可以实现安全角色配置、安全功能管理查看答案
试题参考答案:D
试题3
已知DES算法的S盒如下:
如果该S盒的输入110011,则其二进制输出为()
A、0110
B、1001
C、0100
D、0101
查看答案
试题参考答案:C
试题4
网络系统中针对海量数据的加密,通常不采用()
A、链路加密
B、会话加密
C、公钥加密
D、端对端加密
查看答案
试题参考答案:C
试题解析与讨论:www.cnitpm.com/st/284939461.html
试题5
根据加密和解密过程所采用密钥的特点可以将加密算法分为对称加密算法和非对称加密算法两类,以下属于对称加密算法的是().查看答案
试题参考答案:C
试题6
(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
查看答案
试题参考答案:D、A、C、B、A
试题7
网络系统中针对海量数据的加密,通常不采用( )方式。查看答案
试题参考答案:B
试题8
由于Internet规模太大,常把它划分成许多小的自治系统,通常把自治系统内部的路由协议称为内部网关协议,自治系统之间的协议称为外部网关协议。以下属于外部网关协议的是()。查看答案
试题参考答案:C
试题9
两个密钥三重DES加密:C=CK1[DK2[EK1[P]]],K1≠K2,其中有效的密钥为()
A、56
B、128
C、168
D、112
查看答案
试题参考答案:D
试题解析与讨论:www.cnitpm.com/st/285084964.html
试题10
无线局域网鉴别和保密体系WAPI是我国无线局域网安全强制性标准,以下关于WAP的描述,正确的是( )。查看答案
试题参考答案:D
信管网订阅号
信管网视频号
信管网抖音号
温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!
信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。
信管网软考课程由信管网依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。
发表评论 查看完整评论 | |