信息安全工程師當(dāng)天每日一練試題地址:www.ichunya.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.ichunya.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/11/23)在線測試:www.ichunya.com/exam/ExamDay.aspx?t1=6&day=2020/11/23
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/11/23)
試題
1: 一個(gè)密碼系統(tǒng)如果用E表示加密運(yùn)算,D表示解密運(yùn)算,M表示明文,C表示密文,則下面描述必然成立的是( )。
A. E(E(M))=C
B. D(E(M))=M
C. D(E(M))=C
D. D(D(M))=M
試題解析與討論:
www.ichunya.com/st/389293064.html試題參考答案:B
試題
2: 按照密碼系統(tǒng)對(duì)明文的處理方法,密碼系統(tǒng)可以分為( )。
A.對(duì)稱密碼系統(tǒng)和公鑰密碼系統(tǒng)
B.對(duì)稱密碼系統(tǒng)和非對(duì)稱密碼系統(tǒng)
C.數(shù)據(jù)加密系統(tǒng)和數(shù)字簽名系統(tǒng)
D.分組密碼系統(tǒng)和序列密碼系統(tǒng)
試題解析與討論:
www.ichunya.com/st/3893815370.html試題參考答案:D
試題
3:
下列哪一項(xiàng)能夠提高網(wǎng)絡(luò)的可用性?()
A.數(shù)據(jù)冗余
B.鏈路冗余
C.軟件冗余
D.電源冗余
試題解析與討論:
www.ichunya.com/st/260678648.html試題參考答案:B
試題
4: 對(duì)日志數(shù)據(jù)進(jìn)行審計(jì)檢查,屬于()類控制措施。
A.預(yù)防
B.檢查
C.威懾
D.修正
試題解析與討論:
www.ichunya.com/st/3270715804.html試題參考答案:B
試題
5: 密碼分析者針對(duì)加解密算法的數(shù)學(xué)基礎(chǔ)和某些密碼學(xué)特性,根據(jù)數(shù)學(xué)方法破譯密碼的攻擊方式稱為( )。
A.數(shù)學(xué)分析攻擊
B.差分分析攻擊
C.基于物理的攻擊
D.窮舉攻擊
試題解析與討論:
www.ichunya.com/st/3892725663.html試題參考答案:A
試題
6: There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)A.message B、information C、requests D、data
(2)A.methods B、cases C、hands D、sections
(3)A.bad B、real C、fake D、new
(4)A.user B、administrator C、editor D、attacker
(5)A.or B、of C、in D、to
試題解析與討論:
www.ichunya.com/st/32757467.html試題參考答案:C、B、C、D、A
試題
7:
射頻識(shí)別(RFID)標(biāo)簽容易受到以下哪種風(fēng)險(xiǎn)?()
A.進(jìn)程劫持
B.竊聽
C.惡意代碼
D.Phishing
試題解析與討論:
www.ichunya.com/st/2609025800.html試題參考答案:B
試題
8:
以下有關(guān)信息安全管理員職責(zé)的敘述,不正確的是()
A、信息安全管理員應(yīng)該對(duì)網(wǎng)絡(luò)的總體安全布局進(jìn)行規(guī)劃
B、信息安全管理員應(yīng)該對(duì)信息系統(tǒng)安全事件進(jìn)行處理
C、信息安全管理員應(yīng)該負(fù)責(zé)為用戶編寫安全應(yīng)用程序
D、信息安全管理員應(yīng)該對(duì)安全設(shè)備進(jìn)行優(yōu)化配置
試題解析與討論:
www.ichunya.com/st/2844417488.html試題參考答案:C
試題
9: SM4是一種分組密碼算法,其分組長度和密鑰長度分別為()。
A.64位和128位
B.128位和128位
C.128位和256位
D.256位和256位
試題解析與討論:
www.ichunya.com/st/3275126410.html試題參考答案:B
試題
10:
數(shù)字簽名最常見的實(shí)現(xiàn)方法是建立在()的組合基礎(chǔ)之上
A、公鑰密碼體制和對(duì)稱密碼體制
B、對(duì)稱密碼體制和MD5摘要算法
C、公鑰密碼體制和單向安全散列函數(shù)算法
D、公證系統(tǒng)和MD4摘要算法
試題解析與討論:
www.ichunya.com/st/2845924106.html試題參考答案:C