信息安全工程師當(dāng)天每日一練試題地址:www.xomuzic.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.xomuzic.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/6/15)在線測試:www.xomuzic.com/exam/ExamDay.aspx?t1=6&day=2020/6/15
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/6/15)
試題
1: When selecting audit procedures, an IS auditor should use professional judgment to ensure that:
A、sufficient evidence will be collected.
B、all significant deficiencies identified will be corrected within a reasonable period.
C、all material weaknesses will be identified.
D、audit costs will be kept at a minimum level.
試題解析與討論:
www.xomuzic.com/st/293947824.html試題參考答案:A
試題
2: An organization has an integrated development environment (IDE) on which the program libraries reside on the server, but modification/development and testing are done from PC workstations. Which of the following would be a strength of an IDE?
A、Controls the proliferation of multiple versions of programs
B、Expands the programming resources and aids available
C、Increases program and processing integrity
D、Prevents valid changes from being overwritten by other changes
試題解析與討論:
www.xomuzic.com/st/2925926338.html試題參考答案:B
試題
3:
安全隔離網(wǎng)閘與防火墻相比,需要采取更強(qiáng)的安全隔離技術(shù),請指出下列哪一項(xiàng)技術(shù)不會(huì)在安全隔離網(wǎng)閘中使用()
A、專用的安全通信協(xié)議
B、專用的硬件通信通道
C、應(yīng)用層的數(shù)據(jù)交換
D、支持?jǐn)?shù)據(jù)包路由
試題解析與討論:
www.xomuzic.com/st/2726129265.html試題參考答案:D
試題
4: As updates to an online order entry system are processed, the updates are recorded on a transaction tape and a hard copy transaction log. At the end of the day, the order entry files are backed up on tape. During the backup procedure, a drive malfunctions and the order entry files are lost. Which of the following is necessary to restore these files?
A、The previous day's backup file and the current transaction tape
B、The previous day's transaction file and the current transaction tape
C、The current transaction tape and the current hard copy transaction log
D、The current hard copy transaction log and the previous day's transaction file
試題解析與討論:
www.xomuzic.com/st/2931327706.html試題參考答案:A
試題
5:
以下哪一項(xiàng)不是流氓軟件的特征?()
A、通常通過誘騙或和其他軟件捆綁在用戶不知情的情況下安裝
B、通常添加驅(qū)動(dòng)保護(hù)使用戶難以卸載
C、通常會(huì)啟動(dòng)無用的程序浪費(fèi)計(jì)算機(jī)的資源
D、通常會(huì)顯示下流的言論
試題解析與討論:
www.xomuzic.com/st/264381444.html試題參考答案:D
試題
6:
為了確保電子郵件中郵件內(nèi)容的安全,應(yīng)該采用以下哪種方式比較恰當(dāng)()
A、 電子郵件發(fā)送時(shí)要加密,并注意不要錯(cuò)發(fā)
B、 電子郵件不需要加密碼
C、 只要向接收者正常發(fā)送就可以了
D、 使用移動(dòng)終端發(fā)送郵件
試題解析與討論:
www.xomuzic.com/st/2668723522.html試題參考答案:A
試題
7: 以下惡意代碼中,屬于宏病毒的是()
A. Macro.Melissa
B. Trojian.huigezi.a
C. Worm.Blaster.g
D. Backdoor.Agobot.frt
試題解析與討論:
www.xomuzic.com/st/327144885.html試題參考答案:A
試題
8:
對于信息安全管理,風(fēng)險(xiǎn)評估的方法比起基線的方法,主要的優(yōu)勢在于它確保()
A.信息資產(chǎn)被過度保護(hù)
B.不考慮資產(chǎn)的價(jià)值,基本水平的保護(hù)都會(huì)被實(shí)施
C.對信息資產(chǎn)實(shí)施適當(dāng)水平的保護(hù)
D.對所有信息資產(chǎn)保護(hù)都投入相同的資源
試題解析與討論:
www.xomuzic.com/st/259855710.html試題參考答案:C
試題
9:
以下哪一項(xiàng)都不是PKI/CA 要解決的問題:()
A、可用性、身份鑒別
B、可用性、授權(quán)與訪問控制
C、完整性、授權(quán)與訪問控制
D、完整性、身份鑒別
試題解析與討論:
www.xomuzic.com/st/2693913281.html試題參考答案:B
試題
10: When performing a computer forensic investigation, in regard to the evidence gathered, an IS auditor should be MOST concerned with:
A、analysis.
B、evaluation.
C、preservation.
D、disclosure.
試題解析與討論:
www.xomuzic.com/st/293651103.html試題參考答案:C