信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html
信息安全工程师每日一练试题(2020/7/22)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/7/22
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2020/7/22)
试题
1: A poor choice of passwords and transmission over unprotected communications lines are examples of:
A、vulnerabilities.
B、threats.
C、probabilities.
D、impacts.
试题解析与讨论:
www.cnitpm.com/st/2961923668.html试题参考答案:A
试题
2:
以下哪项不是信息安全的主要目标()
A.确保业务连续性
B.保护信息免受各种威胁的损害
C.防止黑客窃取员工个人信息
D.投资回报和商业机遇最大化
试题解析与讨论:
www.cnitpm.com/st/2628225670.html试题参考答案:C
试题
3: The information security policy that states “each individual must have their badge read at every controlled door” addresses which of the following attack methods?
A、Piggybacking
B、Shoulder surfing
C、Dumpster diving
D、Impersonation
试题解析与讨论:
www.cnitpm.com/st/296081161.html试题参考答案:A
试题
4:
“短信轰炸机”软件 会对我们的手机造成怎样的危害( )
A、 短时内大量收到垃圾短信,造成手机死机
B、 会使手机发送带有恶意链接的短信
C、 会损害手机中的SIM卡
D、 会大量发送垃圾短信,永久损害手机的短信收发功能
试题解析与讨论:
www.cnitpm.com/st/2668129387.html试题参考答案:A
试题
5:
甲不但怀疑乙发给他的被人篡改,而且怀疑乙的公钥也是被人冒充的,为了消除甲的疑虑,甲和乙决定找一个双方都信任的第三方来签发数字证书,这个第三方为()
A、国际电信联盟电信标准分部(ITU-T)
B、国家安全局(NSA)
C、认证中心(CA)
D、国家标准化组织(ISO)
试题解析与讨论:
www.cnitpm.com/st/2847915378.html试题参考答案:C
试题
6: 以下不属于信息安全风险评估中需要识别的对象是()
A.资产识别
B.威胁识别
C.风险识别
D.脆弱性识别
试题解析与讨论:
www.cnitpm.com/st/327293322.html试题参考答案:C
试题
7: The phases and deliverables of a system development life cycle (SDLC) project should be determined:
A、during the initial planning stages of the project.
B、after early planning has been completed, but before work has begun.
C、throughout the work stages, based on risks and exposures.
D、only after all risks and exposures have been identified and the IS auditor has recommended appropriate controls.
试题解析与讨论:
www.cnitpm.com/st/2975326108.html试题参考答案:A
试题
8: Which of the following is the MOST likely reason why e-mail systems have become a useful source of evidence for litigation?
A、Multiple cycles of backup files remain available.
B、Access controls establish accountability for e-mail activity.
C、Data classification regulates what information should be communicated via e-mail.
D、Within the enterprise, a clear policy for using e-mail ensures that evidence is available.
试题解析与讨论:
www.cnitpm.com/st/2970814794.html试题参考答案:A
试题
9:
计算机感染木马的典型现象是()。
A.有未知程序试图建立网络连接
B.收到大量垃圾邮件
C.系统不断重新启动
D.蓝屏
试题解析与讨论:
www.cnitpm.com/st/2556318892.html试题参考答案:A
试题
10: Which of the following is an attribute of the control self-assessment (CSA) approach?
A、Broad stakeholder involvement
B、Auditors are the primary control analysts
C、Limited employee participation
D、Policy driven
试题解析与讨论:
www.cnitpm.com/st/2940228466.html试题参考答案:A