专业信息安全工程师网站|培训机构|服务商(2021信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2018/12/24)
来源:信管网 2018年12月25日 【所有评论 分享到微信

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class27-6-1.aspx

信息安全工程师每日一练试题(2018/12/24)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2018/12/24

信息安全工程师每日一练试题内容(2018/12/24)

试题1

网络的可用性是指( )。
A、网络通信能力的大小
B、用户用于网络维修的时间
C、网络的可靠性
D、用户可利用网络时间的百分比

试题解析与讨论:www.cnitpm.com/st/92613189.html
试题参考答案:D

试题2: 1995年Kruchten提出了著名的“4+1”视图,用来描述软件爱你系统的架构。在“4+1”视图中,(1)用来描述设计的对象模型和对象之间的关系;(2)描述了软件模块的组织与管理;(3)描述设计的并发同步特征。
(1)A.逻辑视图
B.用例视图
C.过程视图
D.开发视图
(2)A.逻辑视图
B.用例视图
C.过程视图
D.开发视图
(3)A.逻辑视图
B.用例视图
C.过程视图
D.开发视图
试题解析与讨论:www.cnitpm.com/st/1299910243.html
试题参考答案:D、A、C

试题3: 甲公司的某个注册商标是乙画家创作的绘画作品,甲申请该商标注册时未经乙的许可,乙认为其著作权受到侵害。在乙可采取的以下做法中,错误的是()。
A.向甲公司所在地人民法院提起著作权侵权诉讼
B.请求商标评审委员会裁定撤销甲的注册商标
C.首先提起诉讼,如对法院判决不服再请求商标评审委员会进行裁定
D.与甲交涉,采取许可方式让甲继续使用该注册商标试题解析与讨论:www.cnitpm.com/st/130131690.html
试题参考答案:C

试题4: 以下关于软件测试工具的叙述,错误的是()。
A. 静态测试工具可用于对软件需求、结构设计、详细设计和代码进行评审、走查和审查
B. 静态测试工具可对软件的复杂度分析、数据流分析、控制流分析和接口分析提供支持
C. 动态测试工具可用于软件的覆盖分析和性能分析
D. 动态测试工具不支持软件的仿真测试和变异测试
试题解析与讨论:www.cnitpm.com/st/1879726715.html
试题参考答案:D

试题5: 识别风险、非风险、敏感点和权衡点是进行软件架构评估的重要过程。“改变业务数据编码方式会对系统的性能和安全性产生影响”是对(1)的描述,“假设用户请求的频率为每秒1个,业务处理时间小于30毫秒,则将请求响应时间设定为1秒钟是可以接受的”是对(2)的描述。
(1)A.风险点
B.非风险
C.敏感点
D.权衡点
(2)A.风险点
B.非风险
C.敏感点
D.权衡点
试题解析与讨论:www.cnitpm.com/st/1890120926.html
试题参考答案:D、B

试题6

某公司财务管理数据只能提供给授权用户,通过采取安全管理措施确保不能被未授权的个人、实体或过程利用或知悉,以确保数据的( )
A、保密性
B、完整性
C、可用性
D、稳定性

试题解析与讨论:www.cnitpm.com/st/2122726164.html
试题参考答案:A

试题7

The objective of ()is to determine what parts of the application software will be assigned to what hardware.The major software components of the system being developed have to be identified and then allocated to the various hardware components on which the system will operate. All software systems can be divided into four basic functions. The first is(). Most information systems require data to be stored and retrieved,whether a small file,such as a memo produced by a word processor,or a large database,such as one that stores an organization’s accounting records. The second function is the (),the processing required to access data,which often means database queries in Structured Query Language. The third function is the (),which is the logic documented in the DFDs,use cases,and functional requirements.The fourth function is the presentation logic,the display of information to the user and the acceptance of the user’s commands.The three primary hardware components of a system are ().
A.architecture design
B.modular design
C.physical design
D.distribution design


A.data access components
B.database management system
C.data storage
D.data entities


A.data persistence
B.data access objects
C.database connection
D.dataaccess logic


A.system requirements
B.system architecture
C.application logic
D.application program


A.computers,cables and network
B.clients,servers,and network
C.CPUs,memories and I/O devices
D.CPUs,hard disks and I/O devices

试题解析与讨论:www.cnitpm.com/st/2895518241.html
试题参考答案:A、C、D、C、B

试题8: 安全审计(security audit)是通过测试公司信息系统对一套确定标准的符合程度来评估其安全性的系统方法,安全审计的主要作用不包括()。
A、对潜在的攻击者起到震慑或警告作用
B、对已发生的系统破坏行为提供有效的追究证据
C、通过提供日志,帮助系统管理员发现入侵行为或潜在漏洞
D、通过性能测试,帮助系统管理员发现性能缺陷或不足
试题解析与讨论:www.cnitpm.com/st/325514765.html
试题参考答案:D

试题9: 为了使一个接口的规范和实现该接口的构件得到广泛应用,需要实现接口的标准化。接口标准化是对( )的标准化。
A.保证接口唯一性的命名方案
B.接口中消息模式、格式和协议
C.接口中所接收的数据格式
D.接口消息适用语境
试题解析与讨论:www.cnitpm.com/st/393209198.html
试题参考答案:B

试题10: The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the (71) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (72), one also has to decide whether to use a two-tier, three-tier,or n-tier architecture. Then the requirements and the architecture design are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (73) specify the operating environment(s) in which the system must perform and how those may change over time. (74) focus on the nonfunctional requirements issues such as response time,capacity,and reliability. (75) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used.
(71)A.functional requirements
B.nonfunctional requirements
C.system constraint
D.system operational environment
(72)A.client-based architecture
B.server-based architecture
C.network architecture
D.client-server architecture
(73)A.Operational requirements
B.Speed requirement
C.Access control requirements
D.Customization requirements
(74)A.Environment requirements
B.Maintainability requirements
C.Performance requirements
D.Virus control requirements
(75)A.Safety requirements
B.Security requirements
C.Data management requirements
D.System requirements
试题解析与讨论:www.cnitpm.com/st/3936428375.html
试题参考答案:B、D、A、C、B

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章