信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2021/6/16)在線測(cè)試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2021/6/16
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2021/6/16)
試題1: 甲收到一份來(lái)自乙的電子訂單后,將訂單中的貨物送達(dá)到乙時(shí),乙否認(rèn)自己曾經(jīng)發(fā)送過(guò)這份訂單,為了解除這種紛爭(zhēng),采用的安全技術(shù)是()
A、數(shù)字簽名技術(shù)
B、數(shù)字證書
C、消息認(rèn)證碼
D、身份認(rèn)證技術(shù)
WI-FI網(wǎng)絡(luò)安全接入是一種保護(hù)無(wú)線網(wǎng)絡(luò)安全的系統(tǒng),WPA加密模式不包括()
A、WPA和WPA2
B、WPA-PSK
C、WEP
D、WPA2-PSK
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
(1)is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party. the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves, and will provide an example using available software.
There are a large number of steganographic (2)that most of us are familiar with (especially if you watch a lot of spy movies), ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding informations, such as:
Covert channels (c,g, Loki and some distributed denial-of-service tools use the Internet Control (3)Protocol, or ICMP, as the communication channel between the “bad guy”and a compromicyed system)
Hidden text within Web pages
Hiding files in “plain sight”(c,g. what better place to “hide”a file than with an important sounding name in the c:\winnt system32 directory)
Null ciphers(c,g, using the first letter of each word to form a hidden message in an otherwise innocuous text)
steganography today, however, is significantly more (4)than the example about suggest, allowing a user to hide large amounts of information within image and audio. These forms of steganography often are used in conjunction with cryptography so the information is double protected; first it is encrypted and then hidden so that an advertisement first. find the information ( an often difficult task in and of itself) and the decrypted it.
The simplest approach to hiding data within an image file is called (5)signature insertion. In this method, we can take the binary representation of the hidden data and the bit of each byte within the covert image. If we are using 24-bit color the amount and will be minimum and indiscriminate to the human eye.
(1)A、Cryptography
B、Geography
C、Stenography
D、Steganography
(2)A、methods
B、software
C、tools
D、services
(3)A、Member
B、Management
C、Message
D、Mail
(4)A、powerful
B、sophistication
C、advanced
D、easy
(5)A、least
B、most
C、much
D、less
安全專家在對(duì)某網(wǎng)站進(jìn)行安全部署時(shí),調(diào)整了Apache 的運(yùn)行權(quán)限,從root 權(quán)限降低為nobody 用戶,以下操作的主要目的是:()
A.為了提高Apache 軟件運(yùn)行效率
B.為了提高Apache 軟件的可靠性
C.為了避免攻擊者通過(guò)Apache 獲得root 權(quán)限
D.為了減少Apache 上存在的漏洞
來(lái)自終端的電磁泄露風(fēng)險(xiǎn),因?yàn)樗鼈?()
A.導(dǎo)致噪音污染
B.? 破壞處理程序
C.? 產(chǎn)生危險(xiǎn)水平的電流
D.? 可以被捕獲并還原
下面哪種方法在數(shù)據(jù)中心滅火最有效并且是環(huán)保的?()
A.哈龍氣體
B.濕管
C.干管
D.二氧化碳?xì)?br/>
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請(qǐng)以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛(ài)好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過(guò)深研歷年考試出題規(guī)律與考試大綱,深挖核心知識(shí)與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評(píng)論 查看完整評(píng)論 | |