信息安全工程師當(dāng)天每日一練試題地址:http://www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.jazzmuze.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/3/21)在線測試:http://www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2017/3/21
信息安全工程師每日一練試題內(nèi)容(2017/3/21)
試題
1: 數(shù)字簽名的主要采取關(guān)鍵技術(shù)是()
A、摘要、摘要的對比
B、摘要、密文傳輸
C、摘要、摘要加密
試題解析與討論:
http://www.jazzmuze.com/st/2431419664.html試題參考答案:A
試題
2:
以下哪些不是介質(zhì)類資產(chǎn):()
A.紙質(zhì)文檔
B.存儲(chǔ)介質(zhì)
C.軟件介質(zhì)
D.憑證
試題解析與討論:
http://www.jazzmuze.com/st/2607420750.html試題參考答案:A
試題
3:
以下哪一個(gè)是對人員安全管理中“授權(quán)蔓延”這概念的正確理解?()
A、外來人員在進(jìn)行系統(tǒng)維護(hù)時(shí)沒有收到足夠的監(jiān)控
B、一個(gè)人擁有了不是其完成工作所必要的權(quán)限
C、敏感崗位和重要操作長期有一個(gè)人獨(dú)自負(fù)責(zé)
D、員工由一個(gè)崗位變動(dòng)到另一個(gè)崗位,累計(jì)越來越多的權(quán)限
試題解析與討論:
http://www.jazzmuze.com/st/2659117158.html試題參考答案:D
試題
4:
關(guān)于信息安全保障技術(shù)框架(IATF),以下說法不正確的是:()
A.分層策略允許在適當(dāng)?shù)臅r(shí)候采用低安全級保障解決方案以便降低信息安全保障的成本
B.IATF從人、技術(shù)和操作三個(gè)層面提供一個(gè)框架實(shí)施多層保護(hù),使攻擊者即使攻破一層也無法破壞整個(gè)信息基礎(chǔ)設(shè)施
C.允許在關(guān)鍵區(qū)域(例如區(qū)域邊界)使用高安全級保障解決方案,確保系統(tǒng)安全性
D.IATF深度防御戰(zhàn)略要求在網(wǎng)絡(luò)體系結(jié)構(gòu)的各個(gè)可能位置實(shí)現(xiàn)所有信息安全保障機(jī)制
試題解析與討論:
http://www.jazzmuze.com/st/2748015605.html試題參考答案:D
試題
5: At the end of the testing phase of software development, an IS auditor observes that an intermittent software error has not been corrected. No action has been taken to resolve the error. The IS auditor should:
A、report the error as a finding and leave further exploration to the auditee's discretion.
B、attempt to resolve the error.
C、recommend that problem resolution be escalated.
D、ignore the error, as it is not possible to get objective evidence for the software error.
試題解析與討論:
http://www.jazzmuze.com/st/2938514492.html試題參考答案:C
試題
6: Which of the following would MOST effectively control the usage of universal storage bus (USB) storage devices?
A、Policies that require instant dismissal if such devices are found
B、Software for tracking and managing USB storage devices
C、Administratively disabling the USB port
D、Searching personnel for USB storage devices at the facility's entrance
試題解析與討論:
http://www.jazzmuze.com/st/294562309.html試題參考答案:B
試題
7: During a business continuity audit an IS auditor found that the business continuity plan (BCP) covered only critical processes. The IS auditor should:
A、recommend that the BCP cover all business processes.
B、assess the impact of the processes not covered.
C、report the findings to the IT manager.
D、redefine critical processes.
試題解析與討論:
http://www.jazzmuze.com/st/2985229666.html試題參考答案:B
試題
8: 組織使用的應(yīng)用系統(tǒng)為無任何經(jīng)過認(rèn)證的開發(fā)人員研發(fā)補(bǔ)丁的開源系統(tǒng)。以下哪種為最安全的開源軟件更新方法?()
A、重寫補(bǔ)丁并應(yīng)用
B、檢查源碼并應(yīng)用可用補(bǔ)丁
C、開發(fā)內(nèi)部補(bǔ)丁
D、在應(yīng)用前檢查并測試對應(yīng)補(bǔ)丁
試題解析與討論:
http://www.jazzmuze.com/st/3009617324.html試題參考答案:D
試題
9: 以下哪個(gè)是缺乏適當(dāng)?shù)陌踩刂频谋憩F(xiàn):()
A、威脅
B、資產(chǎn)
C、影響
D、脆弱性
試題解析與討論:
http://www.jazzmuze.com/st/3017610553.html試題參考答案:D
試題
10: 在下列那種情況下無線局域網(wǎng)中的數(shù)據(jù)傳輸機(jī)密性得到了最好的保護(hù):()
A、限于預(yù)先確定的MAC地址。
B、使用靜態(tài)密鑰加密。
C、使用動(dòng)態(tài)密鑰加密。
D、從具有加密存儲(chǔ)的設(shè)備初始化。
試題解析與討論:
http://www.jazzmuze.com/st/3023019146.html試題參考答案:C