专业信息安全工程师网站|服务平台|服务商(信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 学习课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2024/3/12)

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2024/3/12)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2024/3/12

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2024/3/12)

  • 试题1

    无线局域网鉴别和保密体系WAPI是我国无线局域网安全强制性标准,以下关于WAP的描述,正确的是(  )。
    A.WAPI从应用模式上分为单点式、分布式和集中式
    B.WAPI与WIFI认证方式类似,均采用单向加密的认证技术
    C.WAPI包括两部分:WAI和WPI,其中WAl采用对称密码算法实现加、解密操作
    D.WAPI的密钥管理方式包括基于证书和基于预共享秘密两种方式

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/3897516736.html

  • 试题2

    以下不属于代码静态分析的方法是()。
    A.内存扫描
    B.模式匹配
    C.定理证明
    D.模型检测

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/3275016237.html

  • 试题3

    以下关于IPSec协议的叙述中,正确的是()
    A、IPSec协议是解决IP协议安全问题的一种方案
    B、IPSec协议不能提供完整性
    C、IPSec协议不能提供机密性保护
    D、IPSec协议不能提供认证功能

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/2849818821.html

  • 试题4

    设在RSA的公钥密码体制中,公钥为(e,n)=(7,55),则私钥d=(  )。
    A.11
    B.15
    C.17
    D.23

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/38988572.html

  • 试题5

    SHAI算法的消息摘要长度是()位
    A.128
    B.160
    C.256
    D.512

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/327211955.html

  • 试题6

    APT攻击是一种以商业或者政治目的为前提的特定攻击,其中攻击者采用口令窃听、漏洞攻击等方式尝试进一步入侵组织内部的个人电脑和服务器,不断提升自己的权限,直至获得核心电脑和服务器控制权的过程被称为(  )。
    A.情报收集
    B.防线突破
    C.横向渗透
    D.通道建立

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/4113228043.html

  • 试题7

    访问控制机制是由一组安全机制构成,可以抽象为一个简单模型,以下不属于访问控制模型要素的是()。
    A.主体
    B.客体
    C.审计库
    D.协议

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/5737211115.html

  • 试题8

    以下选项中,不属于生物识别方法的是(  )。
    A.掌纹识别
    B.个人标记号识别
    C.人脸识别
    D.指纹识别

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/3894014927.html

  • 试题9

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    试题参考答案:A、D、C、B、A

    试题解析与讨论:www.cnitpm.com/st/4115223167.html

  • 试题10

    SM4算法是国家密码管理局于2012年3月21日发布的一种分组密码算法,在我国商用密码体系中,SM4主要用于数据加密。SM4算法的分组长度和密钥长度分别为().
    A.128位和64位
    B.128位和128位
    C.256位和128位
    D.256位和256位

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/5020222146.html

信管网订阅号

信管网视频号

信管网抖音号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章

精选

课程

提问

评论

收藏