信息安全工程師當天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2022/6/6)在線測試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2022/6/6
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2022/6/6)
試題1
惡意軟件是目前移動智能終端上被不法分子利用最多、對用戶造成危害和損失最大的安全成脅類型。數據顯示,目前安卓平臺惡意軟件主要有( )四種類型。查看答案
試題參考答案:A
試題2
資產管理是信息安全管理的重要內容,而清楚地識別信息系統(tǒng)相關的財產,并編制資產清單是資產管理的重要步驟。以下關于資產清單的說法中,錯誤的是()。查看答案
試題參考答案:B
試題3
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
試題參考答案:C、B、C、D、A
試題4
攻擊者通過對目標主機進行端口掃描可以直接獲得( )。查看答案
試題參考答案:B
試題5
IPSec屬于( )的安全解決方案。查看答案
試題參考答案:A
試題6
認證是證實某事是否名副其實或者是否有效的一個過程。以下關于認證的敘述中, 不正確的是( )。查看答案
試題參考答案:C
試題7
訪問控制是對信息系統(tǒng)資源進行保護的重要措施,適當的訪問控制能夠阻止未經授權的用戶有意或者無意地獲取資源。計算機系統(tǒng)中,訪問控制的任務不包括() 。查看答案
試題參考答案:A
試題8
已知DES算法S盒如下:查看答案
試題參考答案:A
試題9
計算機取證是將計算機調查和分析技術應用于對潛在的,有法律效力的證據的確定與提取.以下關于計算機取證的描述中,錯誤的是( )。查看答案
試題參考答案:A
試題10
目前使用的防殺病毒軟件的作用是()
A、檢查計算機是否感染病毒,清除已感染的任何病毒
B、杜絕病毒對計算機的侵害
C、查出已感染的任何病毒,清除部分已感染病毒
D、檢查計算機是否感染病毒,清除部分已感染病毒
查看答案
試題參考答案:D
溫馨提示:因考試政策、內容不斷變化與調整,信管網網站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!
信管網致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網軟考課程由信管網依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |