信息安全工程師當天每日一練試題地址:http://www.xomuzic.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.xomuzic.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/6/25)在線測試:http://www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2017/6/25
信息安全工程師每日一練試題內(nèi)容(2017/6/25)
試題
1:
為了對計算機信息系統(tǒng)的安全威脅有更全面、更深刻的認識,信息應用系統(tǒng)安全威脅的分類方法一般用( )三種“綜合分類”方法。
A. 高、中、低
B. 對象的價值、實施的手段、影響(結(jié)果)
C. 按風險性質(zhì)、按風險結(jié)果、按風險源
D. 自然事件、人為事件、系統(tǒng)薄弱環(huán)節(jié)
試題解析與討論:
http://www.xomuzic.com/st/22979.html試題參考答案:C
試題
2:
訪問控制是為了限制訪問主體對訪問客體的訪問權(quán)限,從而使計算機系統(tǒng)在合法范圍內(nèi)使用的安全措施,以下關(guān)于訪問控制的敘述中,()是不正確的
A、訪問控制包括2個重要的過程:鑒別和授權(quán)
B、訪問控制機制分為2種:強制訪問控制(MAC)和自主訪問控制(DAC)
C、RBAC基于角色的訪問控制對比DAC的先進之處在于用戶可以自主的將訪問的權(quán)限授給其它用戶
D、RBAC不是基于多級安全需求的,因為基于RBAC的系統(tǒng)中主要關(guān)心的是保護信息的完整性,即”誰可以對什么信息執(zhí)行何種動作”
試題解析與討論:
http://www.xomuzic.com/st/1926829474.html試題參考答案:C
試題
3:
訪問控制表與訪問能力表相比,具有以下那個特點:()
A、訪問控制表更容易實現(xiàn)訪問權(quán)限的特點
B、訪問能力表更容易瀏覽訪問權(quán)限
C、訪問控制表回收訪問權(quán)限更困難
D、訪問控制表更適用于集中式系統(tǒng)
試題解析與討論:
http://www.xomuzic.com/st/2651922542.html試題參考答案:D
試題
4:
網(wǎng)絡安全領(lǐng)域,VPN通常用于建立()之間的安全訪問通道。
A、 總部與分支機構(gòu)、與合作伙伴、與移動辦公用戶、遠程用戶;
B、 客戶與客戶、與合作伙伴、遠程用戶;
C、 同一個局域網(wǎng)用戶;
D、 僅限于家庭成員;
試題解析與討論:
http://www.xomuzic.com/st/267601432.html試題參考答案:A
試題
5:
關(guān)于監(jiān)理過程中成本控制,下列說法中正確的是?()
A.成本只要不超過預計的收益即可
B.成本應控制得越低越好
C.成本控制由承建單位實現(xiàn),監(jiān)理單位只能記錄實際開銷
D.成本控制的主要目的是在批準的預算條件下確保項目保質(zhì)按期完成
試題解析與討論:
http://www.xomuzic.com/st/273878960.html試題參考答案:D
試題
6: An organization has a mix of access points that cannot be upgraded to stronger security and newer access points having advanced wireless security. An IS auditor recommends replacing the nonupgradeable access points. Which of the following would BEST justify the IS auditor's recommendation?
A、The new access points with stronger security are affordable.
B、The old access points are poorer in terms of performance.
C、The organization's security would be as strong as its weakest points.
D、The new access points are easier to manage.
試題解析與討論:
http://www.xomuzic.com/st/2927616282.html試題參考答案:C
試題
7: An IS auditor who has discovered unauthorized transactions during a review of EDI transactions is likely to recommend improving the:
A、EDI trading partner agreements.
B、physical controls for terminals.
C、authentication techniques for sending and receiving messages.
D、program change control procedures.
試題解析與討論:
http://www.xomuzic.com/st/293215913.html試題參考答案:C
試題
8: Which of the following types of firewalls would BEST protect a network from an Internet attack?
A、Screened subnet firewall
B、Application filtering gateway
C、Packet filtering router
D、Circuit-level gateway
試題解析與討論:
http://www.xomuzic.com/st/294741104.html試題參考答案:A
試題
9: When segregation of duties concerns exist between IT support staff and end users, what would be a suitable compensating control?
A、Restricting physical access to computing equipment
B、Reviewing transaction and application logs
C、Performing background checks prior to hiring IT staff
D、Locking user sessions after a specified period of inactivity
試題解析與討論:
http://www.xomuzic.com/st/2955015870.html試題參考答案:B
試題
10: Many organizations require an employee to take a mandatory vacation (holiday) of a week or more to:
A、ensure the employee maintains a good quality of life, which will lead to greater productivity.
B、reduce the opportunity for an employee to commit an improper or illegal act.
C、provide proper cross-training for another employee.
D、eliminate the potential disruption caused when an employee takes vacation one day at a time.
試題解析與討論:
http://www.xomuzic.com/st/297414698.html試題參考答案:B