信息安全工程師當天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2024/12/23)在線測試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2024/12/23)
試題1
身份識別在信息安全領域有著廣泛的應用,通過識別用戶的生理特征來認證用戶的身份是安全性很高的身份認證方法。如果把人體特征用于身份識別,則它應該具有不可復制的特點,必須具有()查看答案
試題參考答案:B
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題2
關鍵信息基礎設施的核心操作系統(tǒng)、關鍵數據庫一般設有操作員、安全員和審計員三種角色類型。以下表述錯誤的是( )。查看答案
試題參考答案:D
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題3
以下( )不屬于Oracle數據庫存在的安全隱患。查看答案
試題參考答案:B
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題4
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
試題參考答案:C、B、C、D、A
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題5
對無線網絡的攻擊可以分為:對無線接口的攻擊、對無線設備的攻擊和對無線網絡的攻擊。以下屬于對無線設備攻擊的是( )。查看答案
試題參考答案:C
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題6
( )的產品特點是基于數據庫協(xié)議分析與控制技術,可實現對數據庫的訪問行為控制和危險操作阻斷的網絡安全產品。查看答案
試題參考答案:B
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題7
( )是一個商業(yè)化滲透平臺,提供網絡敵手仿真和滲透操作。查看答案
試題參考答案:C
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題8
關于阿里云安全應急響應服務SLA說明,不正確的是( )查看答案
試題參考答案:B
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題9
包過濾的控制依據是規(guī)則集,典型的過濾規(guī)則表示格式由( )組成。查看答案
試題參考答案:A
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
試題10
( )用于數據庫用戶身份識別和認證,用戶只有通過認證后才能對數據庫對象進行操作。查看答案
試題參考答案:D
試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2024/12/23
信管網訂閱號
信管網視頻號
信管網抖音號
溫馨提示:因考試政策、內容不斷變化與調整,信管網網站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!
信管網致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網軟考課程由信管網依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |