午夜无码中文字幕影院,国产自产第一区c国产,久久久久久夜精品精品免费,国产99久久,夜夜夜夜曰天天天天拍国产,欧美日韩亚洲另类专区,国产精品区一区二区免费

專業(yè)信息安全工程師網(wǎng)站|服務(wù)平臺|服務(wù)商(信息安全工程師學(xué)習(xí)QQ群:327677606,客服QQ:800184589)

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 信息安全工程師 >> 每日一練 >> 文章內(nèi)容
信息安全工程師每日一練試題(2024/6/29)

信息安全工程師當(dāng)天每日一練試題地址:www.xomuzic.com/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:www.xomuzic.com/class/27/e6_1.html

信息安全工程師每日一練試題(2024/6/29)在線測試:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

點擊查看:更多信息安全工程師習(xí)題與指導(dǎo)

信息安全工程師每日一練試題內(nèi)容(2024/6/29)

  • 試題1

    根據(jù)自主可控的安全需求,近些年國密算法和標(biāo)準(zhǔn)體系受到越來越多的關(guān)注,基于國密算法的應(yīng)用也得到了快速發(fā)展。我國國密標(biāo)準(zhǔn)中的雜湊算法是()
    A.SM2
    B.SM3
    C.SM4
    D.SM9

    查看答案

    試題參考答案:B

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題2

    研究密碼破譯的科學(xué)稱為密碼分析學(xué)。密碼分析學(xué)中,根據(jù)密碼分析者可利用的數(shù)據(jù)資源,可將攻擊密碼的類型分為四種,其中適于攻擊公開密碼體制,特別是攻擊其數(shù)字簽名的是 (  )。
    A、僅知密文攻擊
    B、已知明文攻擊
    C、選擇密文攻擊
    D、選擇明文攻擊

    查看答案

    試題參考答案:C

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題3

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    試題參考答案:A、D、C、B、A

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題4

    安全滲透測試通過模擬攻擊者對測評對象進(jìn)行安全攻擊,以驗證安全防護(hù)機(jī)制的有效性。其中需要提供部分測試對象信息,測試團(tuán)隊根據(jù)所獲取的信息,模擬不同級別的威脅者進(jìn)行滲透測試,這屬于(    )。
    A.黑盒測試
    B.白盒測試
    C.灰盒測試
    D.盲盒測試

    查看答案

    試題參考答案:C

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題5

    計算機(jī)取證是將計算機(jī)調(diào)查和分析技術(shù)應(yīng)用于對潛在的、有法律效應(yīng)的確定和提取。以下關(guān)于計算機(jī)取證的描述中,錯誤的是()
    A、計算機(jī)取證包括對以磁介質(zhì)編碼信息方式存儲的計算機(jī)證據(jù)的提取和歸檔
    B、計算機(jī)取證圍繞電子證據(jù)進(jìn)行,電子證據(jù)具有高科技性等特點
    C、計算機(jī)取證包括保護(hù)目標(biāo)計算機(jī)系統(tǒng),確定收集和保存電子證據(jù),必須在開計算機(jī)的狀態(tài)下進(jìn)行
    D、計算機(jī)取證是一門在犯罪進(jìn)行過程中或之后收集證據(jù)

    查看答案

    試題參考答案:C

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題6

    密碼分析的目的是()
    A.發(fā)現(xiàn)加密算法
    B.發(fā)現(xiàn)密鑰或者密文對應(yīng)的明文
    C.發(fā)現(xiàn)解密算法
    D.發(fā)現(xiàn)攻擊者

    查看答案

    試題參考答案:B

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題7

    在缺省安裝數(shù)據(jù)庫管理系統(tǒng)MySQL后,root用戶擁有所有權(quán)限且是空口令,為了安全起見,必須為root用戶設(shè)置口令,以下口令設(shè)置方法中,不正確的是(  )。
    A.使用MySQL自帶的命令mysqladmin設(shè)置root口令
    B.使用setpassword設(shè)置口令
    C.登錄數(shù)據(jù)庫,修改數(shù)據(jù)庫mysql下user表的字段內(nèi)容設(shè)置口令
    D.登錄數(shù)據(jù)庫,修改數(shù)據(jù)庫mysql下的訪問控制列表內(nèi)容設(shè)置口令

    查看答案

    試題參考答案:D

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題8

    在信息安全防護(hù)體系設(shè)計中,保證“信息系統(tǒng)中數(shù)據(jù)不被非法修改、破壞、丟失等”是為了達(dá)到防護(hù)體系的()目標(biāo)。
    A.可用性
    B.保密性
    C.可控性
    D.完整性

    查看答案

    試題參考答案:D

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題9

    計算機(jī)網(wǎng)絡(luò)為了實現(xiàn)資源共享,采用協(xié)議分層設(shè)計思想,每層網(wǎng)絡(luò)協(xié)議都有地址信息,如網(wǎng)卡(MAC)地址、IP地址、端口地址和域名地址,以下有關(guān)上述地址轉(zhuǎn)換的描述錯誤的是 (   )。
    A.DHCP協(xié)議可以完成IP地址和端口地址的轉(zhuǎn)換
    B.DNS協(xié)議可以實現(xiàn)域名地址和IP地址之間的轉(zhuǎn)換
    C.ARP協(xié)議可以實現(xiàn)MAC地址和IP地址之間的轉(zhuǎn)換
    D.域名地址和端口地址無法轉(zhuǎn)換

    查看答案

    試題參考答案:A

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題10

    蜜罐技術(shù)是一種主動防御技術(shù),是入侵檢測技術(shù)的一個重要發(fā)展方向。蜜罐有四種不同置方式:誘騙服務(wù)、弱化系統(tǒng)、強化系統(tǒng)和用戶模式服務(wù)器,其中在特定IP服務(wù)端口進(jìn)行偵聽并對其他應(yīng)用程序的各種網(wǎng)絡(luò)請求進(jìn)行應(yīng)答,這種應(yīng)用程序?qū)儆冢ǎ?br />A.誘騙服務(wù)
    B.弱化系統(tǒng)
    C.強化系統(tǒng)
    D.用戶模式服務(wù)器

    查看答案

    試題參考答案:A

    試題解析與討論:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

信管網(wǎng)訂閱號

信管網(wǎng)視頻號

信管網(wǎng)抖音號

溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準(zhǔn)!

信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。

信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。

相關(guān)內(nèi)容

發(fā)表評論  查看完整評論  

推薦文章

精選

課程

提問

評論

收藏