软题库 学习课程
当前位置:信管网 >> 在线考试中心 >> 信息安全工程师题库 >> 试题查看
试卷年份2021年下半年
试题题型【单选题】
试题内容

交换机是构成网络的基础设备,主要功能是负责网络通信数据包的交换传输。交换机根据功能变化分为五代,其中第二代交换机又称为以太网交换机,其工作于OSI(开放系统互连参考模型)的 (    ) 。
A.物理层
B.数据链路层
C.网络层
D.应用层

查看答案

相关试题

65题: 最小化配置服务是指在满足业务的前提下,尽量关闭不需要的服务和网络端口,以减少系统潜在的安全危害。以下实现Linux系统网络服务最小化的操作,正确的是(   )。
A.inetd.conf的文件权限设置为644
B.services的文件权限设置为600
C.inetd.conf的文件属主为root
D.关闭与系统业务运行有关的网络通信端口
答案解析与讨论:www.cnitpm.com/st/52286269.html

66题: 数据库脱敏是指利用数据脱敏技术将数据库中的数据进行变换处理,在保持数据按需使用目标的同时,又能避免敏感数据外泄。以下技术中,不属于数据脱敏技术的是(    )。
A.屏蔽
B.变形
C.替换
D.访问控制
答案解析与讨论:www.cnitpm.com/st/522872170.html

67题: Oracle数据库提供认证、访问控制、特权管理、透明加密等多种安全机制和技术。以下关于Oracle数据库表述,错误的是(    )。
A.Oracle数据库的认证方式采用“用户名+口令”的方式
B.Oracle数据库不支持三方认证
C.Oracle数据库具有口令加密和复杂度验证等安全功能
D.Oracle数据库提供细粒度访问控制
答案解析与讨论:www.cnitpm.com/st/5228821589.html

69题: Apache Httpd 是一个用于搭建Web 服务器的开源软件。Apache Httpd配置文件中,负责基本读取文件控制的是(    )。
A.httpd.conf
B.srm.conf
C.access.conf
D.mime.conf
答案解析与讨论:www.cnitpm.com/st/522904931.html

70题: 口令是保护路由器安全的有效方法,一旦口令信息泄露就会危及路由器安全。因此,路由器的口令存放应是密文。在路由器配置时,使用(    )命令保存口令密文。
A. Enable secret
B. key chain
C. key-string
D. no ip finger
答案解析与讨论:www.cnitpm.com/st/5229114195.html

71题: Methods for (71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72) calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73) protocols we've already discussed are not well suited if the principal being uthenticated is a person (with all the associated limitations). All approaches for human authentication rely on at least one of the followings:
Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
Something you are (eg. a fingerprint).Base authentication on something (75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.
A.authenticating
B.authentication
C.authorizing
D.authorization
A.much
B.huge
C.large
D.big
A.network
B.cryptographic
C.communication
D.security
A.are
B.have
C.can
D.owned
A.unique
B.expenseive
C.important
D.intrinsic
答案解析与讨论:www.cnitpm.com/st/5229210411.html