中文字幕综合一区,伊人av网,欧美中日韩在线,亚洲国产香蕉视频,黄视频在线免费,天天操天天爱天天爽,狠狠躁天天躁

專(zhuān)業(yè)信息安全工程師網(wǎng)站|服務(wù)平臺(tái)|服務(wù)商(信息安全工程師學(xué)習(xí)QQ群:327677606,客服QQ:800184589)

軟題庫(kù) 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 信息安全工程師 >> 每日一練 >> 文章內(nèi)容
信息安全工程師每日一練試題(2024/6/29)

信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html

信息安全工程師每日一練試題(2024/6/29)在線測(cè)試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)

信息安全工程師每日一練試題內(nèi)容(2024/6/29)

  • 試題1

    根據(jù)自主可控的安全需求,近些年國(guó)密算法和標(biāo)準(zhǔn)體系受到越來(lái)越多的關(guān)注,基于國(guó)密算法的應(yīng)用也得到了快速發(fā)展。我國(guó)國(guó)密標(biāo)準(zhǔn)中的雜湊算法是()
    A.SM2
    B.SM3
    C.SM4
    D.SM9

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題2

    研究密碼破譯的科學(xué)稱(chēng)為密碼分析學(xué)。密碼分析學(xué)中,根據(jù)密碼分析者可利用的數(shù)據(jù)資源,可將攻擊密碼的類(lèi)型分為四種,其中適于攻擊公開(kāi)密碼體制,特別是攻擊其數(shù)字簽名的是 (  )。
    A、僅知密文攻擊
    B、已知明文攻擊
    C、選擇密文攻擊
    D、選擇明文攻擊

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題3

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    試題參考答案:A、D、C、B、A

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題4

    安全滲透測(cè)試通過(guò)模擬攻擊者對(duì)測(cè)評(píng)對(duì)象進(jìn)行安全攻擊,以驗(yàn)證安全防護(hù)機(jī)制的有效性。其中需要提供部分測(cè)試對(duì)象信息,測(cè)試團(tuán)隊(duì)根據(jù)所獲取的信息,模擬不同級(jí)別的威脅者進(jìn)行滲透測(cè)試,這屬于(    )。
    A.黑盒測(cè)試
    B.白盒測(cè)試
    C.灰盒測(cè)試
    D.盲盒測(cè)試

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題5

    計(jì)算機(jī)取證是將計(jì)算機(jī)調(diào)查和分析技術(shù)應(yīng)用于對(duì)潛在的、有法律效應(yīng)的確定和提取。以下關(guān)于計(jì)算機(jī)取證的描述中,錯(cuò)誤的是()
    A、計(jì)算機(jī)取證包括對(duì)以磁介質(zhì)編碼信息方式存儲(chǔ)的計(jì)算機(jī)證據(jù)的提取和歸檔
    B、計(jì)算機(jī)取證圍繞電子證據(jù)進(jìn)行,電子證據(jù)具有高科技性等特點(diǎn)
    C、計(jì)算機(jī)取證包括保護(hù)目標(biāo)計(jì)算機(jī)系統(tǒng),確定收集和保存電子證據(jù),必須在開(kāi)計(jì)算機(jī)的狀態(tài)下進(jìn)行
    D、計(jì)算機(jī)取證是一門(mén)在犯罪進(jìn)行過(guò)程中或之后收集證據(jù)

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題6

    密碼分析的目的是()
    A.發(fā)現(xiàn)加密算法
    B.發(fā)現(xiàn)密鑰或者密文對(duì)應(yīng)的明文
    C.發(fā)現(xiàn)解密算法
    D.發(fā)現(xiàn)攻擊者

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題7

    在缺省安裝數(shù)據(jù)庫(kù)管理系統(tǒng)MySQL后,root用戶擁有所有權(quán)限且是空口令,為了安全起見(jiàn),必須為root用戶設(shè)置口令,以下口令設(shè)置方法中,不正確的是(  )。
    A.使用MySQL自帶的命令mysqladmin設(shè)置root口令
    B.使用setpassword設(shè)置口令
    C.登錄數(shù)據(jù)庫(kù),修改數(shù)據(jù)庫(kù)mysql下user表的字段內(nèi)容設(shè)置口令
    D.登錄數(shù)據(jù)庫(kù),修改數(shù)據(jù)庫(kù)mysql下的訪問(wèn)控制列表內(nèi)容設(shè)置口令

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題8

    在信息安全防護(hù)體系設(shè)計(jì)中,保證“信息系統(tǒng)中數(shù)據(jù)不被非法修改、破壞、丟失等”是為了達(dá)到防護(hù)體系的()目標(biāo)。
    A.可用性
    B.保密性
    C.可控性
    D.完整性

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題9

    計(jì)算機(jī)網(wǎng)絡(luò)為了實(shí)現(xiàn)資源共享,采用協(xié)議分層設(shè)計(jì)思想,每層網(wǎng)絡(luò)協(xié)議都有地址信息,如網(wǎng)卡(MAC)地址、IP地址、端口地址和域名地址,以下有關(guān)上述地址轉(zhuǎn)換的描述錯(cuò)誤的是 (   )。
    A.DHCP協(xié)議可以完成IP地址和端口地址的轉(zhuǎn)換
    B.DNS協(xié)議可以實(shí)現(xiàn)域名地址和IP地址之間的轉(zhuǎn)換
    C.ARP協(xié)議可以實(shí)現(xiàn)MAC地址和IP地址之間的轉(zhuǎn)換
    D.域名地址和端口地址無(wú)法轉(zhuǎn)換

    查看答案

    試題參考答案:A

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題10

    蜜罐技術(shù)是一種主動(dòng)防御技術(shù),是入侵檢測(cè)技術(shù)的一個(gè)重要發(fā)展方向。蜜罐有四種不同置方式:誘騙服務(wù)、弱化系統(tǒng)、強(qiáng)化系統(tǒng)和用戶模式服務(wù)器,其中在特定IP服務(wù)端口進(jìn)行偵聽(tīng)并對(duì)其他應(yīng)用程序的各種網(wǎng)絡(luò)請(qǐng)求進(jìn)行應(yīng)答,這種應(yīng)用程序?qū)儆冢ǎ?br />A.誘騙服務(wù)
    B.弱化系統(tǒng)
    C.強(qiáng)化系統(tǒng)
    D.用戶模式服務(wù)器

    查看答案

    試題參考答案:A

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

信管網(wǎng)訂閱號(hào)

信管網(wǎng)視頻號(hào)

信管網(wǎng)抖音號(hào)

溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請(qǐng)以權(quán)威部門(mén)公布的內(nèi)容為準(zhǔn)!

信管網(wǎng)致力于為廣大信管從業(yè)人員、愛(ài)好者、大學(xué)生提供專(zhuān)業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書(shū)、技能提升和就業(yè)的需求。

信管網(wǎng)軟考課程由信管網(wǎng)依托10年專(zhuān)業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過(guò)深研歷年考試出題規(guī)律與考試大綱,深挖核心知識(shí)與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。

相關(guān)內(nèi)容

發(fā)表評(píng)論  查看完整評(píng)論  

推薦文章

精選

課程

提問(wèn)

評(píng)論

收藏