信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/6/3)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/3
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/6/3)
试题
1: Change management procedures are established by IS management to:
A、control the movement of applications from the test environment to the production environment.
B、control the interruption of business operations from lack of attention to unresolved problems.
C、ensure the uninterrupted operation of the business in the event of a disaster.
D、verify that system changes are properly documented.
试题解析与讨论:
www.cnitpm.com/st/2961414608.html试题参考答案:A
试题
2: An IS auditor was hired to review e-business security. The IS auditor's first task was to examine each existing e-business application looking for vulnerabilities. What would be the next task?
A、Report the risks to the CIO and CEO immediately
B、Examine e-business application in development
C、Identify threats and likelihood of occurrence
D、Check the budget available for risk management
试题解析与讨论:
www.cnitpm.com/st/2931627428.html试题参考答案:C
试题
3:
以下哪些是需要在信息安全策略中进行描述的:()
A.组织信息系统安全架构
B.信息安全工作的基本原则
C.组织信息安全技术参数
D.组织信息安全实施手段
试题解析与讨论:
www.cnitpm.com/st/2564829145.html试题参考答案:B
试题
4: A benefit of open system architecture is that it: ()
A、facilitates interoperability.
B、facilitates the integration of proprietary components.
C、will be a basis for volume discounts from equipment vendors.
D、allows for the achievement of more economies of scale for equipment.
试题解析与讨论:
www.cnitpm.com/st/2915622357.html试题参考答案:A
试题
5: The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
A、integrity.
B、authenticity.
C、authorization.
D、nonrepudiation.
试题解析与讨论:
www.cnitpm.com/st/2933117599.html试题参考答案:A
试题
6: Which of the following satisfies a two-factor user authentication?
A、Iris scanning plus fingerprint scanning
B、Terminal ID plus global positioning system (GPS)
C、A smart card requiring the user's PIN
D、User ID along with password
试题解析与讨论:
www.cnitpm.com/st/294015551.html试题参考答案:C
试题
7:
下列安全协议中,()可用于安全电子邮件加密。
A.PGP
B.SET
C.SSL
D.TLS
试题解析与讨论:
www.cnitpm.com/st/2710425242.html试题参考答案:A
试题
8: Which of the following recovery strategies is MOST appropriate for a business having multiple offices within a region and a limited recovery budget?
A、A hot site maintained by the business
B、A commercial cold site
C、A reciprocal arrangement between its offices
D、A third-party hot site
试题解析与讨论:
www.cnitpm.com/st/298641295.html试题参考答案:C
试题
9:
下面哪一个工具不支持漏洞扫描()
A、BT5
B、NMAP
C、wireshahe
D、nessus
试题解析与讨论:
www.cnitpm.com/st/272816553.html试题参考答案:C
试题
10:
账号锁定策略中对超过一定次数的错误登录账号进行锁定是为了对抗以下哪种攻击?()
A.分布式拒绝服务攻击(DDoS)
B.病毒传染
C.口令暴力破解
D.缓冲区溢出攻击
试题解析与讨论:
www.cnitpm.com/st/2562623997.html试题参考答案:C