信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2025/3/10)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2025/3/10)
试题1
为了应对网络威胁,人为划分若干安全区域,下列不属于安全区域的是( )查看答案
试题参考答案:D
试题2
一个Kerberos系统涉及四个基本实体,其中( )是识别用户身份并提供TGS会话密钥。查看答案
试题参考答案:D
试题3
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
试题参考答案:D、C、A、B、A
试题4
访问控制的正确步骤是( )查看答案
试题参考答案:B
试题5
网络安全等级保护工作主要包括定级、备案、( )、等级测评、监督检查五个阶段。查看答案
试题参考答案:B
试题6
WPDRRC模型模型蕴涵的网络安全能力不包括( )查看答案
试题参考答案:D
试题7
云计算平台物理安全威胁的一个典型例子是( )查看答案
试题参考答案:C
试题8
( )的产品特点是部署在不同安全域之间,解析和过滤经过防火墙的数据流,集成应用识别和管控、恶意代码防护、入侵防护、事件关联等多种安全功能,同时具备网络层和应用层访问控制及过滤功能的网络安全产品。查看答案
试题参考答案:D
试题9
研究密码破译的科学称为密码分析学。密码分析学中,根据密码分析者可利用的数据资源,可将攻击密码的类型分为四种,其中适于攻击公开密码体制,特别是攻击其数字签名的是 ( )。查看答案
试题参考答案:C
试题10
电子政务网络由政务内网和政务外网构成,两网之间( ),政务外网与互联网之间( )。查看答案
试题参考答案:B
信管网订阅号
信管网视频号
信管网抖音号
温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!
信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。
信管网软考课程由信管网依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。
发表评论 查看完整评论 | |