信息安全工程師當天每日一練試題地址:http://www.xomuzic.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.xomuzic.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/6/6)在線測試:http://www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2017/6/6
信息安全工程師每日一練試題內(nèi)容(2017/6/6)
試題
1:
3DES 在DES 的基礎上,使用兩個56 位的密鑰K1 和K2,發(fā)送方用K1 加密,K2 解密,再用K1 加密。接受方用K1 解密,K2 加密,再用K1 解密,這相當于使用( )倍于DES 的密鑰長度的加密效果。
A.1
B.2
C.3
D.6
試題解析與討論:
http://www.xomuzic.com/st/114.html試題參考答案:B
試題
2: 入侵檢測的過程不包括下列哪個階段()。
A、信息收集
B、信息分析
C、信息融合
D、告警與響應
試題解析與討論:
http://www.xomuzic.com/st/2153325609.html試題參考答案:C
試題
3:
電子商務交易必須具備抗抵賴性, 目的在于防止()。
A.一個實體假裝成另一個實體
B.參與此交易的一方否認曾經(jīng)發(fā)生過此次交易
C.他人對數(shù)據(jù)進行非授權的修改、破壞
D.信息從被監(jiān)視的通信過程中泄漏出去
試題解析與討論:
http://www.xomuzic.com/st/2554313793.html試題參考答案:B
試題
4:
信息系統(tǒng)審核員應該預期誰來授權對生產(chǎn)數(shù)據(jù)和生產(chǎn)系統(tǒng)的訪問?()
A.流程所有者
B.系統(tǒng)管理員
C.安全管理員
D.數(shù)據(jù)所有者
試題解析與討論:
http://www.xomuzic.com/st/258528403.html試題參考答案:D
試題
5:
為了保護網(wǎng)絡系統(tǒng)的硬件、軟件及其系統(tǒng)中的數(shù)據(jù),需要相應的網(wǎng)絡安全工具,以下安全工具中()被比喻為網(wǎng)絡安全的大門,用來鑒別什么樣的數(shù)據(jù)包可以進入企業(yè)內(nèi)部網(wǎng)。
A、殺毒軟件
B、入侵檢測系統(tǒng)
C、安全審計系統(tǒng)
D、防火墻
試題解析與討論:
http://www.xomuzic.com/st/2830611955.html試題參考答案:D
試題
6: Which of the following is the GREATEST advantage of elliptic curve encryption over RSA encryption?
A、Computation speed
B、Ability to support digital signatures
C、Simpler key distribution
D、Greater strength for a given key length
試題解析與討論:
http://www.xomuzic.com/st/2915223602.html試題參考答案:A
試題
7: A manufacturing firm wants to automate its invoice payment system. Objectives state that the system should require considerably less time for review and authorization and the system should be capable of identifying errors that require follow up. Which of the following would BEST meet these objectives?
A、Establishing an inter-networked system of client servers with suppliers for increased efficiencies
B、Outsourcing the function to a firm specializing in automated payments and accounts receivable/invoice processing
C、Establishing an EDI system of electronic business documents and transactions with key suppliers, computer to computer, in a standard format
D、Reengineering the existing processing and redesigning the existing system
試題解析與討論:
http://www.xomuzic.com/st/2980019188.html試題參考答案:C
試題
8: The computer security incident response team (CSIRT) of an organization disseminates detailed descriptions of recent threats. An IS auditor's GREATEST concern should be that the users might:
A、use this information to launch attacks.
B、forward the security alert.
C、implement individual solutions.
D、fail to understand the threat.
試題解析與討論:
http://www.xomuzic.com/st/2982516746.html試題參考答案:A
試題
9: 信息系統(tǒng)審計師了解到一個開發(fā)中的系統(tǒng)有12個相連的模塊,并且每個數(shù)據(jù)項有10個可定義的屬性列。此系統(tǒng)每年處理好幾百萬樁交易。那么審計師運用以下哪種技術最能檢測出開發(fā)成果的規(guī)模?()
A、項目評審技術(PERT)
B、源代碼行數(shù)(SLOC,單點估計方法)
C、功能點分析
D、百盒測試
試題解析與討論:
http://www.xomuzic.com/st/3016123141.html試題參考答案:C
試題
10: 在非安全的通信環(huán)境中,為了保證消息來源的可靠性,通常采用的安全防護技術是()
A.信息隱藏技術
B.數(shù)據(jù)加密技術
C.消息認證技術
D.數(shù)字水印技術
試題解析與討論:
http://www.xomuzic.com/st/3272526383.html試題參考答案:C