信息安全工程師當天每日一練試題地址:www.conferencecallsmadeeasy.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.conferencecallsmadeeasy.com/class/27/e6_1.html
信息安全工程師每日一練試題(2021/2/28)在線測試:www.conferencecallsmadeeasy.com/exam/ExamDay.aspx?t1=6&day=2021/2/28
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2021/2/28)
試題
1:
利用公開密鑰算法進行數據加密時,采用的方法是()
A、發(fā)送方用公開密鑰加密,接收方用公開密鑰解密
B、發(fā)送方用私有密鑰加密,接收方用私有密鑰解密
C、發(fā)送方用公開密鑰加密,接收方用私有密鑰解密
D、發(fā)送方用私有密鑰加密,接收方用公開密鑰解密
試題解析與討論:
www.conferencecallsmadeeasy.com/st/2847616861.html試題參考答案:C
試題
2: 網絡密罐技術是一種主動防御技術,是入侵檢測技術的一個重要發(fā)展方向,以下有關密罐說法不正確的是()。
A.密罐系統(tǒng)是一個包含漏洞的誘騙系統(tǒng),它通過模擬一個或者多個易受攻擊的主機和服務,給攻擊者提供一個容易攻擊的目標
B.使用密罐技術,可以使目標系統(tǒng)得以保護,便于研究入侵者的攻擊行為
C.如果沒人攻擊,密罐系統(tǒng)就變得毫無意義
D.密罐系統(tǒng)會直接提高計算機網絡安全等級,是其他安全策略不可替代的試題解析與討論:
www.conferencecallsmadeeasy.com/st/3274929126.html試題參考答案:D
試題
3:
數字水印技術通過在數字化的多媒體數據中嵌入隱蔽的水印標記,可以有效地對數字多媒體數據的版權保護等功能。以下各項中,不屬于數字水印在數字版權保護必須滿足的基本應用需求的是()
A、安全性
B、隱蔽性
C、魯棒性
D、可見性
試題解析與討論:
www.conferencecallsmadeeasy.com/st/2846317420.html試題參考答案:D
試題
4: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
試題解析與討論:
www.conferencecallsmadeeasy.com/st/32757467.html試題參考答案:C、B、C、D、A
試題
5: 安全漏洞掃描技術是一類重要的網絡安全技術。當前,網絡安全漏洞掃描技術的兩大核心技術是()
A.PINC掃描技術和端口掃描技術
B.端口掃描技術和漏洞掃描技術
C.操作系統(tǒng)探測和漏洞掃描技術
D. PINC掃描技術和操作系統(tǒng)探測
試題解析與討論:
www.conferencecallsmadeeasy.com/st/3273012281.html試題參考答案:B
試題
6: 如果未經授權的實體得到了數據的訪問權,這屬于破壞了信息的( )。
A.可用性
B.完整性
C.機密性
D.可控性
試題解析與討論:
www.conferencecallsmadeeasy.com/st/3893720640.html試題參考答案:C
試題
7: WI-FI網絡安全接入是一種保護無線網絡安全的系統(tǒng),WPA加密的認證方式不包括( )。
A.WPA和WPA2
B.WEP
C.WPA-PSK
D.WPA2-PSK
試題解析與討論:
www.conferencecallsmadeeasy.com/st/389604283.html試題參考答案:B
試題
8: 對日志數據進行審計檢查,屬于()類控制措施。
A.預防
B.檢查
C.威懾
D.修正
試題解析與討論:
www.conferencecallsmadeeasy.com/st/3270715804.html試題參考答案:B
試題
9: 設在RSA的公鑰密碼體制中,用于為(e,n)=(7,55),則私鑰d=()。
A. 8
B. 13
C. 23
D. 37
試題解析與討論:
www.conferencecallsmadeeasy.com/st/327521419.html試題參考答案:C
試題
10: 證書授權中心(CA)的主要職責不包含()。
A.證書管理
B.證書簽發(fā)
C.證書加密
D.證書撤銷
試題解析與討論:
www.conferencecallsmadeeasy.com/st/3274624347.html試題參考答案:C