中文字幕综合一区,伊人av网,欧美中日韩在线,亚洲国产香蕉视频,黄视频在线免费,天天操天天爱天天爽,狠狠躁天天躁

專業(yè)信息安全工程師網(wǎng)站|服務(wù)平臺(tái)|服務(wù)商(信息安全工程師學(xué)習(xí)QQ群:327677606,客服QQ:800184589)

軟題庫 學(xué)習(xí)課程
當(dāng)前位置:信管網(wǎng) >> 信息安全工程師 >> 每日一練 >> 文章內(nèi)容
信息安全工程師每日一練試題(2025/4/15)

信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html

信息安全工程師每日一練試題(2025/4/15)在線測(cè)試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)

信息安全工程師每日一練試題內(nèi)容(2025/4/15)

  • 試題1

    在惡意代碼查殺過程中,殺毒廠商主要依賴哪種方式分辨惡意代碼?
    A. 實(shí)時(shí)行為監(jiān)控
    B. 啟發(fā)式掃描
    C. 特征碼匹配
    D. 云端智能分析

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題2

    Methods for (71)people differ significantly from those for authenticating machines and programs, and this is because of the major differences in the capabilities of people versus computers.Computers are great at doing(72) calculations quickly and correctly, and they have large memories into which they can store and later retrieve Gigabytes of information. Humans don't. So we need to use different methods to authenticate people. In particular, the(73) protocols we've already discussed are not well suited if the principal being authenticated is a person (with all the associated limitations).
    All approaches for human authentication rely on at least one of the followings:

    Something you know (eg. a password).This is the most common kind of authentication used for humans.We use passwords every day to access our systems. Unfortunately,something that you know can become something you just forgot. And if you write it down, then other people might find it.
    Something you(74)(eg.a smart card).This form of human authentication removes the problem of forgetting something you know, but some object now must be with you any time you want to be authenticated. And such an object might be stolen and then becomes something the attacker has.
    Something you are (eg. a fingerprint).Base authentication on something (75)to the principal being authenticated. It's much harder to lose a fingerprint than a wallet. Unfortunately,biometric sensors are fairly expensive and (at present) not very accurate.

    71
    A.a(chǎn)uthenticating
    B.a(chǎn)uthentication
    C.a(chǎn)uthorizing
    D.a(chǎn)uthorization
    72
    A.much
    B.huge
    C.large
    D.big
    73
    A.network
    B.cryptographic
    C.communication
    D.security
    74
    A.a(chǎn)re
    B.have
    C.can
    D.owned
    75
    A.unique
    B.expensive
    C.important

    D.intrinsic

    查看答案

    試題參考答案:A、C、B、B、D

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題3

    利用時(shí)間來約束訪問操作,在一些系統(tǒng)中為了增加訪問控制的適應(yīng)性,增加了時(shí)間因素的控制是(   )
    A.基于角色的訪問控制規(guī)則
    B.基于時(shí)間的訪問控制規(guī)則
    C.基于用戶身份的訪問控制規(guī)則
    D.基于地址的訪問控制規(guī)則

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題4

    攻擊樹的優(yōu)點(diǎn)不包括( )
    A.能夠進(jìn)行費(fèi)效分析或者概率分析
    B.能夠建模非常復(fù)雜的攻擊場(chǎng)景
    C.能夠建模循環(huán)事件
    D.能夠采取專家頭腦風(fēng)暴法,并且將這些意見融合到攻擊樹中去

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題5

    已知DES算法的S盒如下:

    如果該S盒的輸入110011,則其二進(jìn)制輸出為()
    A、0110
    B、1001
    C、0100
    D、0101

    查看答案

    試題參考答案:C

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題6

    Oracle數(shù)據(jù)庫的(   )機(jī)制用于保護(hù)敏感數(shù)據(jù),防止未授權(quán)變更。
    A.?dāng)?shù)據(jù)備份
    B.?dāng)?shù)據(jù)庫保險(xiǎn)庫
    C.審計(jì)日志
    D.透明數(shù)據(jù)加密

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題7

    Hash 算法是指產(chǎn)生哈希值或雜湊值的計(jì)算方法。MD5算法是由Rivest 設(shè)計(jì)的Hash算法,該算法以512比特?cái)?shù)據(jù)塊為單位處理輸入,產(chǎn)生(    )的哈希值。
    A.64比特
    B.128比特
    C.256比特
    D.512比特

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題8

    PDRR模型是Protection、Detection、Recovery、Response。其中檢測(cè)(Detection)的主要內(nèi)容不包括(   )
    A.系統(tǒng)脆弱性檢測(cè)
    B.?dāng)?shù)據(jù)完整性檢測(cè)
    C.攻擊性檢測(cè)
    D.防火墻技術(shù)

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題9

    從對(duì)信息的破壞性上看,網(wǎng)絡(luò)攻擊可以分為被動(dòng)攻擊和主動(dòng)攻擊,以下屬于被動(dòng)攻擊的是()
    A.偽造
    B.流量分析
    C.拒絕服務(wù)
    D.中間人攻擊

    查看答案

    試題參考答案:B

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

  • 試題10

    以下哪些不屬于網(wǎng)絡(luò)通信線路常見的物理安全威脅(  )
    A.網(wǎng)絡(luò)通信線路被老鼠咬斷
    B.網(wǎng)絡(luò)通信線路受到電磁干擾不能正常傳輸信息
    C.網(wǎng)絡(luò)通信線路泄漏電磁信號(hào),導(dǎo)致通信線路上的傳輸信息泄密。
    D.網(wǎng)絡(luò)通信線路受到網(wǎng)絡(luò)攻擊

    查看答案

    試題參考答案:D

    試題解析與討論:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2025/4/15

信管網(wǎng)訂閱號(hào)

信管網(wǎng)視頻號(hào)

信管網(wǎng)抖音號(hào)

溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請(qǐng)以權(quán)威部門公布的內(nèi)容為準(zhǔn)!

信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。

信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識(shí)與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。

相關(guān)內(nèi)容

發(fā)表評(píng)論  查看完整評(píng)論  

試題推薦

推薦文章

精選

課程

提問

評(píng)論

收藏