中文字幕综合一区,伊人av网,欧美中日韩在线,亚洲国产香蕉视频,黄视频在线免费,天天操天天爱天天爽,狠狠躁天天躁

專業(yè)信息安全工程師網(wǎng)站|服務(wù)平臺(tái)|服務(wù)商(信息安全工程師學(xué)習(xí)QQ群:327677606,客服QQ:800184589)

軟題庫(kù) 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 信息安全工程師 >> 每日一練 >> 文章內(nèi)容
信息安全工程師每日一練試題(2024/3/12)

信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html

信息安全工程師每日一練試題(2024/3/12)在線測(cè)試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/3/12

點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)

信息安全工程師每日一練試題內(nèi)容(2024/3/12)

  • 試題1

    無(wú)線局域網(wǎng)鑒別和保密體系WAPI是我國(guó)無(wú)線局域網(wǎng)安全強(qiáng)制性標(biāo)準(zhǔn),以下關(guān)于WAP的描述,正確的是(  )。
    A.WAPI從應(yīng)用模式上分為單點(diǎn)式、分布式和集中式
    B.WAPI與WIFI認(rèn)證方式類似,均采用單向加密的認(rèn)證技術(shù)
    C.WAPI包括兩部分:WAI和WPI,其中WAl采用對(duì)稱密碼算法實(shí)現(xiàn)加、解密操作
    D.WAPI的密鑰管理方式包括基于證書和基于預(yù)共享秘密兩種方式

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/st/3897516736.html

  • 試題2

    以下不屬于代碼靜態(tài)分析的方法是()。
    A.內(nèi)存掃描
    B.模式匹配
    C.定理證明
    D.模型檢測(cè)

    查看答案

    試題參考答案:A

    試題解析與討論:www.jazzmuze.com/st/3275016237.html

  • 試題3

    以下關(guān)于IPSec協(xié)議的敘述中,正確的是()
    A、IPSec協(xié)議是解決IP協(xié)議安全問(wèn)題的一種方案
    B、IPSec協(xié)議不能提供完整性
    C、IPSec協(xié)議不能提供機(jī)密性保護(hù)
    D、IPSec協(xié)議不能提供認(rèn)證功能

    查看答案

    試題參考答案:A

    試題解析與討論:www.jazzmuze.com/st/2849818821.html

  • 試題4

    設(shè)在RSA的公鑰密碼體制中,公鑰為(e,n)=(7,55),則私鑰d=(  )。
    A.11
    B.15
    C.17
    D.23

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/st/38988572.html

  • 試題5

    SHAI算法的消息摘要長(zhǎng)度是()位
    A.128
    B.160
    C.256
    D.512

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/st/327211955.html

  • 試題6

    APT攻擊是一種以商業(yè)或者政治目的為前提的特定攻擊,其中攻擊者采用口令竊聽(tīng)、漏洞攻擊等方式嘗試進(jìn)一步入侵組織內(nèi)部的個(gè)人電腦和服務(wù)器,不斷提升自己的權(quán)限,直至獲得核心電腦和服務(wù)器控制權(quán)的過(guò)程被稱為(  )。
    A.情報(bào)收集
    B.防線突破
    C.橫向滲透
    D.通道建立

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/st/4113228043.html

  • 試題7

    訪問(wèn)控制機(jī)制是由一組安全機(jī)制構(gòu)成,可以抽象為一個(gè)簡(jiǎn)單模型,以下不屬于訪問(wèn)控制模型要素的是()。
    A.主體
    B.客體
    C.審計(jì)庫(kù)
    D.協(xié)議

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/st/5737211115.html

  • 試題8

    以下選項(xiàng)中,不屬于生物識(shí)別方法的是(  )。
    A.掌紋識(shí)別
    B.個(gè)人標(biāo)記號(hào)識(shí)別
    C.人臉識(shí)別
    D.指紋識(shí)別

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/st/3894014927.html

  • 試題9

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    試題參考答案:A、D、C、B、A

    試題解析與討論:www.jazzmuze.com/st/4115223167.html

  • 試題10

    SM4算法是國(guó)家密碼管理局于2012年3月21日發(fā)布的一種分組密碼算法,在我國(guó)商用密碼體系中,SM4主要用于數(shù)據(jù)加密。SM4算法的分組長(zhǎng)度和密鑰長(zhǎng)度分別為().
    A.128位和64位
    B.128位和128位
    C.256位和128位
    D.256位和256位

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/st/5020222146.html

信管網(wǎng)訂閱號(hào)

信管網(wǎng)視頻號(hào)

信管網(wǎng)抖音號(hào)

溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請(qǐng)以權(quán)威部門公布的內(nèi)容為準(zhǔn)!

信管網(wǎng)致力于為廣大信管從業(yè)人員、愛(ài)好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。

信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過(guò)深研歷年考試出題規(guī)律與考試大綱,深挖核心知識(shí)與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。

相關(guān)內(nèi)容

發(fā)表評(píng)論  查看完整評(píng)論  

推薦文章

精選

課程

提問(wèn)

評(píng)論

收藏