信息安全工程師當天每日一練試題地址:www.conferencecallsmadeeasy.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.conferencecallsmadeeasy.com/class/27/e6_1.html
信息安全工程師每日一練試題(2022/7/15)在線測試:www.conferencecallsmadeeasy.com/exam/ExamDay.aspx?t1=6&day=2022/7/15
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2022/7/15)
試題1
防火墻的經(jīng)典體系結構主要有三種,下圖給出的是()體系結構。查看答案
試題參考答案:C
試題2
《網(wǎng)絡安全法》明確了國家落實網(wǎng)絡安全工作的職能部門和職責,其中明確規(guī)定由( )負責統(tǒng)籌協(xié)調網(wǎng)絡安全工作和相關監(jiān)督管理工作。查看答案
試題參考答案:C
試題3
BS7799標準是英國標準協(xié)會制定的信息安全管理體系標準,它包括兩個部分:《信息安全管理實施指南》和《信息安全管理體系規(guī)范和應用指南》。依據(jù)該標準可以組織建立、實施與保持信息安全管理體系,但不能實現(xiàn)( )。查看答案
試題參考答案:B
試題4
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
試題參考答案:D、C、A、B、A
試題5
信息系統(tǒng)受到破壞后,會對社會秩序和公共利益造成特別嚴重損害,或者對國家安全造成嚴重損害,按照計算機信息系統(tǒng)安全等級保護相關要求,應定義為()。查看答案
試題參考答案:D
試題6
計算機取證是將計算機調查和分析技術應用于對潛在的,有法律效力的證據(jù)的確定與提取.以下關于計算機取證的描述中,錯誤的是( )。查看答案
試題參考答案:A
試題7
網(wǎng)絡物理隔離有利于強化網(wǎng)絡安全的保障,增強涉密網(wǎng)絡的安全性。以下關于網(wǎng)絡物理隔離實現(xiàn)技術的表述,錯誤的是( )。查看答案
試題參考答案:A
試題8
在下圖給出的加密過程中Mi,i=1,2,…,n表示明文分組,Ci,i=1,2,…,n表示密文分組,IV表示初始序列,K表示密鑰,E表示分組加密。該分組加密過程的工作模式是( )。查看答案
試題參考答案:D
試題9
SM4是一種分組密碼算法,其分組長度和密鑰長度分別為()。查看答案
試題參考答案:B
試題10
Diffie-Hellman密鑰交換協(xié)議是一種共享秘鑰的方案,該協(xié)議是基于求解( )的困難性。查看答案
試題參考答案:B
溫馨提示:因考試政策、內容不斷變化與調整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |