信息安全工程師當(dāng)天每日一練試題地址:www.xomuzic.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.xomuzic.com/class/27/e6_1.html
信息安全工程師每日一練試題(2021/10/14)在線測試:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2021/10/14
點擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2021/10/14)
試題
1: The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
Stream ciphers, in contrast to the ‘block’type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
(71)
A.plaintext
B.ciphertext
C.data
D.hash
(72)
A.stream cipher
B.hash function
C.Message authentication code
D.Block cipher
(73)
A.of
B.for
C.with
D.in
(74)
A.hash
B.stream
C.ciphertext
D.plaintext
(75)
A.collisions
B.image
C.preimage
D.solution
試題解析與討論:
www.xomuzic.com/st/4115223167.html試題參考答案:A、D、C、B、A
試題
2:
一個全局的安全框架必須包含的安全結(jié)構(gòu)因素是()
A、審計、完整性、保密性、可用性
B、審計、完整性、身份認(rèn)證、保密性、可用性
C、審計、完整性、身份認(rèn)證、可用性
D、審計、完整性、身份認(rèn)證、保密性
試題解析與討論:
www.xomuzic.com/st/28490785.html試題參考答案:B
試題
3: 身份認(rèn)證是證實客戶的真實身份與其所聲稱的身份是否相符的驗證過程。目前,計算機(jī)及網(wǎng)絡(luò)系統(tǒng)中常用的身份認(rèn)證技術(shù)主要有:用戶名/密碼方式、智能卡認(rèn)證、動態(tài)口令、生物特征認(rèn)證等。其中能用于身份認(rèn)證的生物特征必須具有( )。
A.唯一性和穩(wěn)定性
B.唯一性和保密性
C.保密性和完整性
D.穩(wěn)定性和完整性
試題解析與討論:
www.xomuzic.com/st/411269152.html試題參考答案:A
試題
4: 下列關(guān)于公鑰密碼體制說法不正確的是( )。
A.在一個公鑰密碼體制中,一般存在公鑰和私鑰兩個密鑰
B.公鑰密碼體制中僅根據(jù)密碼算法和加密密鑰來確定解密密鑰在計算上是可行的
C.公鑰密碼體制中僅根據(jù)密碼算法和加密密來確定解密密在計算上是不可行的
D.公鑰密碼體制中的私鑰可以用來進(jìn)行數(shù)字簽名
試題解析與討論:
www.xomuzic.com/st/389898585.html試題參考答案:B
試題
5: 數(shù)字水印技術(shù)通過在數(shù)字化的多媒體數(shù)據(jù)中嵌入隱蔽的水印標(biāo)記,可以有效實現(xiàn)對數(shù)字多媒體數(shù)據(jù)的版權(quán)保護(hù)功能。以下關(guān)于數(shù)字水印的描述中,不正確的是( )。
A.隱形數(shù)字水印可應(yīng)用于數(shù)據(jù)偵測與跟蹤
B.在數(shù)字水印技術(shù)中,隱藏水印的數(shù)據(jù)量和魯棒性是一對矛盾
C.秘密水印也稱盲化水印,其驗證過程不需要原始秘密信息
D.視頻水印算法必須滿足實時性的要求
試題解析與討論:
www.xomuzic.com/st/411011580.html試題參考答案:C
試題
6: SSL協(xié)議(安全套接層協(xié)議)是Netscape公司推出的一種安全通信協(xié)議,以下服務(wù)中,SSL協(xié)議不能提供的是( )。
A.用戶和服務(wù)器的合法性認(rèn)證服務(wù)
B.加密數(shù)據(jù)服務(wù)以隱藏被傳輸?shù)臄?shù)據(jù)
C.維護(hù)數(shù)據(jù)的完整性
D.基于UDP應(yīng)用的安全保護(hù)
試題解析與討論:
www.xomuzic.com/st/411353400.html試題參考答案:D
試題
7: 惡意軟件是目前移動智能終端上被不法分子利用最多、對用戶造成危害和損失最大的安全成脅類型。數(shù)據(jù)顯示,目前安卓平臺惡意軟件主要有( )四種類型。
A.遠(yuǎn)程控制木馬、話費吸取類、隱私竊取類和系統(tǒng)破壞類
B.遠(yuǎn)程控制木馬、話費吸取類、系統(tǒng)破壞類和硬件資源消耗類
C.遠(yuǎn)程控制木馬、話費吸取類、隱私竊取類和惡意推廣
D.遠(yuǎn)程控制木馬、話費吸取類、系統(tǒng)破壞類和惡意推廣
試題解析與討論:
www.xomuzic.com/st/3893322538.html試題參考答案:A
試題
8:
S/Key口令是一種一次性口令生產(chǎn)方案,它可以對抗()
A、惡意代碼木馬攻擊
B、拒絕服務(wù)攻擊
C、協(xié)議分析攻擊
D、重放攻擊
試題解析與討論:
www.xomuzic.com/st/2845025503.html試題參考答案:D
試題
9: 在PKI中,關(guān)于RA的功能,描述正確的是( )。
A.RA是整個PKI體系中各方都承認(rèn)的一個值得信賴的、公正的第三方機(jī)構(gòu)
B.RA負(fù)責(zé)產(chǎn)生,分配并管理PKI結(jié)構(gòu)下的所有用戶的數(shù)字證書,把用戶的公鑰和用戶的其他信息綁在一起,在網(wǎng)上驗證用戶的身份
C.RA負(fù)責(zé)證書廢止列表CRL的登記和發(fā)布
D.RA負(fù)責(zé)證書申請者的信息錄入,審核以及證書的發(fā)放等任務(wù),同時,對發(fā)放的證書完成相應(yīng)的管理功能
試題解析與討論:
www.xomuzic.com/st/389837447.html試題參考答案:D
試題
10: 在我國,依據(jù)《中華人民共和國標(biāo)準(zhǔn)化法》可以將標(biāo)準(zhǔn)劃分為:國家標(biāo)準(zhǔn)、行業(yè) 標(biāo)準(zhǔn)、地方標(biāo)準(zhǔn)和企業(yè)標(biāo)準(zhǔn)4個層次?!缎畔踩夹g(shù)信息系統(tǒng)安全等級保護(hù)基本要求》 (GB/T 22239-2008)屬于( )。
A.國家標(biāo)準(zhǔn)
B.行業(yè)標(biāo)準(zhǔn)
C.地方標(biāo)準(zhǔn)
D.企業(yè)標(biāo)準(zhǔn)
試題解析與討論:
www.xomuzic.com/st/411391775.html試題參考答案:A