专业信息安全工程师网站|培训机构|服务商(2021信息安全工程师学习QQ群:327677606,客服QQ:800184589)

软题库 培训课程
当前位置:信管网 >> 信息安全工程师 >> 每日一练 >> 文章内容
信息安全工程师每日一练试题(2020/10/21)
来源:信管网 2020年10月22日 【所有评论 分享到微信

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/10/21)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/10/21

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/10/21)

试题1

常见密码系统包含的元素是:()
A.明文,密文,信道,加密算法,解密算法
B.明文,摘要,信道,加密算法,解密算法
C.明文,密文,密钥,加密算法,解密算法
D.消息,密文,信道,加密算法,解密算法

试题解析与讨论:www.cnitpm.com/st/2689318961.html
试题参考答案:C

试题2: Which of the following would an IS auditor consider the MOST relevant to short-term planning for an IS department? 
A、Allocating resources 
B、Keeping current with technology advances 
C、Conducting control self-assessment 
D、Evaluating hardware needs 
试题解析与讨论:www.cnitpm.com/st/2927321032.html
试题参考答案:A

试题3: Which of the following is a dynamic analysis tool for the purpose of testing software modules? 
A、Black box test 
B、Desk checking 
C、Structured walkthrough 
D、Design and code 
试题解析与讨论:www.cnitpm.com/st/293363783.html
试题参考答案:A

试题4: The activation of an enterprise's business continuity plan should be based on predetermined criteria that address the: 
A、duration of the outage. 
B、type of outage. 
C、probability of the outage. 
D、cause of the outage. 
试题解析与讨论:www.cnitpm.com/st/2930921041.html
试题参考答案:A

试题5: Which of the following audit techniques would BEST aid an auditor in determining whether there have been unauthorized program changes since the last authorized program update? 
A、Test data run 
B、Code review 
C、Automated code comparison 
D、Review of code migration procedures 
试题解析与讨论:www.cnitpm.com/st/295612358.html
试题参考答案:C

试题6

下述选项中对于"风险管理"的描述正确的是:()
A.安全必须是完美无缺、面面俱到的。
B.最完备的信息安全策略就是最优的风险管理对策
C.在应对信息安全风险时,要从经济、技术、管理的可行性和有效性上做出权衡和取舍.
D.防范不足就会造成损失:防范过多就可以避免损失。

试题解析与讨论:www.cnitpm.com/st/27348932.html
试题参考答案:C

试题7: An IS auditor is performing a network security review of a telecom company that provides Internet connection services to shopping malls for their wireless customers. The company uses Wireless Transport Layer Security (WTLS) and Secure Sockets Layer (SSL) technology for protecting their customer's payment information. The IS auditor should be MOST concerned if a hacker: 
A、compromises the Wireless Application Protocol (WAP) gateway. 
B、installs a sniffing program in front of the server. 
C、steals a customer's PDA. 
D、listens to the wireless transmission. 
试题解析与讨论:www.cnitpm.com/st/2949620302.html
试题参考答案:A

试题8

灾难发生后,系统和数据必须恢复到的()
A、时间要求
B、时间点要求
C、数据状态
D、运行状态

试题解析与讨论:www.cnitpm.com/st/2698710767.html
试题参考答案:B

试题9: What is the MOST effective method of preventing unauthorized use of data files? 
A、Automated file entry 
B、Tape librarian 
C、Access control software 
D、Locked library 
试题解析与讨论:www.cnitpm.com/st/2926218918.html
试题参考答案:C

试题10: Which of the following IT governance best practices improves strategic alignment? 
A、Supplier and partner risks are managed. 
B、A knowledge base on customers, products, markets and processes is in place. 
C、A structure is provided that facilitates the creation and sharing of business information. 
D、Top management mediate between the imperatives of business and technology. 
试题解析与讨论:www.cnitpm.com/st/297313734.html
试题参考答案:D

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与最新大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

发表评论  查看完整评论  

相关内容

推荐文章