信息安全工程師當(dāng)天每日一練試題地址:http://m.pokkc.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://m.pokkc.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/3/4)在線測(cè)試:http://m.pokkc.com/exam/ExamDay.aspx?t1=6&day=2017/3/4
信息安全工程師每日一練試題內(nèi)容(2017/3/4)
試題
1: 網(wǎng)上營(yíng)業(yè)中間件如果啟用了SSl,應(yīng)采用不低于()版本的SSL,采用經(jīng)國家密碼管理局認(rèn)可的密碼算法。
A、2.0
B、2.5
C、3.0
D、3.1
試題解析與討論:
http://m.pokkc.com/st/2252325334.html試題參考答案:C
試題
2:
以下哪些是信息資產(chǎn)無需明確的()
A.所有者
B.管理者
C.廠商
D.使用者
試題解析與討論:
http://m.pokkc.com/st/260764137.html試題參考答案:C
試題
3:
以下哪個(gè)選項(xiàng)是缺乏適當(dāng)?shù)陌踩刂频谋憩F(xiàn)()
A.威脅
B.脆弱性
C.資產(chǎn)
D.影響
試題解析與討論:
http://m.pokkc.com/st/26194728.html試題參考答案:B
試題
4:
計(jì)算機(jī)病毒會(huì)對(duì)下列計(jì)算機(jī)服務(wù)造成威脅,除了:()
A.完整性
B.有效性
C.保密性
D.可用性
試題解析與討論:
http://m.pokkc.com/st/2722822244.html試題參考答案:C
試題
5:
智能卡是指粘貼或嵌有集成電路芯片的一種便攜式卡片塑膠,智能卡的片內(nèi)操作系統(tǒng)(COS)是智能卡芯片內(nèi)的一個(gè)監(jiān)控軟件,以下不屬于COS組成部分的是()
A、通訊管理模塊
B、數(shù)據(jù)管理模塊
C、安全管理模塊
D、文件管理模塊
試題解析與討論:
http://m.pokkc.com/st/284973343.html試題參考答案:B
試題
6: After reviewing its business processes, a large organization is deploying a new web application based on a VoIP technology. Which of the following is the MOST appropriate approach for implementing access control that will facilitate security management of the VoIP web application?
A、Fine-grained access control
B、Role-based access control (RBAC)
C、Access control lists
D、Network/service access control
試題解析與討論:
http://m.pokkc.com/st/293467653.html試題參考答案:B
試題
7: Due to changes in IT, the disaster recovery plan of a large organization has been changed. What is the PRIMARY risk if the new plan is not tested?
A、Catastrophic service interruption
B、High consumption of resources
C、Total cost of the recovery may not be minimized
D、Users and recovery teams may face severe difficulties when activating the plan
試題解析與討論:
http://m.pokkc.com/st/295185219.html試題參考答案:A
試題
8: Applying a digital signature to data traveling in a network provides:
A、confidentiality and integrity.
B、security and nonrepudiation.
C、integrity and nonrepudiation.
D、confidentiality and nonrepudiation.
試題解析與討論:
http://m.pokkc.com/st/2971321921.html試題參考答案:C
試題
9: 一個(gè)程序員惡意地修改了生產(chǎn)程序代碼以改變數(shù)據(jù),隨后又恢復(fù)了源代碼。下列哪一項(xiàng)是發(fā)現(xiàn)這個(gè)惡意行為的最有效的:()
A、比較源代碼
B、檢查系統(tǒng)日志文件
C、比較目標(biāo)代碼
D、比較可執(zhí)行代碼和源代碼的完整性
試題解析與討論:
http://m.pokkc.com/st/302809519.html試題參考答案:B
試題
10: 在網(wǎng)絡(luò)傳輸中應(yīng)用數(shù)字簽名技術(shù)可以保證:()
A.機(jī)密性和完整性
B.安全性和不可否認(rèn)性
C.完整性和不可否認(rèn)性
D.機(jī)密性和不可否認(rèn)性
試題解析與討論:
http://m.pokkc.com/st/3040329927.html試題參考答案:C