信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class27-6-1.aspx
信息安全工程師每日一練試題(2019/5/8)在線測試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2019/5/8
信息安全工程師每日一練試題內(nèi)容(2019/5/8)
試題
1:
安全管理是信息系統(tǒng)安全能動性的組成部分,它貫穿于信息系統(tǒng)規(guī)劃、設(shè)計、運行和維護的各階段。安全管理中的介質(zhì)安全屬于( )。
A.技術(shù)安全
B.管理安全
C.物理安全
D.環(huán)境安全
試題解析與討論:
www.jazzmuze.com/st/352122.html試題參考答案:C
試題
2:
WindowsNT和Windows2000系統(tǒng)能設(shè)置為在若干次無效登錄后鎖定賬號,此技術(shù)可以防止( )。
A、暴力攻擊
B、木馬病毒
C、緩存溢出攻擊
D、IP欺騙
試題解析與討論:
www.jazzmuze.com/st/787271.html試題參考答案:A
試題
3:
“沖擊波”病毒屬于 (1) 類型的病毒,它利用 Windows 操作系統(tǒng)的 (2) 漏 洞進行快速傳播。
(1)A、蠕蟲
B、文件
C、引導(dǎo)區(qū)
D、郵件
(2)A、CGI 腳本
B、RPC
C、DNS
D、IMAP
試題解析與討論:
www.jazzmuze.com/st/78802713.html試題參考答案:A、B
試題
4:
安全電子郵件使用( )協(xié)議。
A、PGP
B、HTTPS
C、MIME
D、DES
試題解析與討論:
www.jazzmuze.com/st/92793195.html試題參考答案:A
試題
5:
()把整個軟件開發(fā)流程分成多個階段,每一個階段都由目標設(shè)定、風(fēng)險分析、開發(fā)和有效性驗證以及評審構(gòu)成。
A.原型模型
B.瀑布模型
C.螺旋模型
D. V模型
試題解析與討論:
www.jazzmuze.com/st/1266928914.html試題參考答案:C
試題
6:
某服務(wù)器軟件系統(tǒng)對可用性(Availability),性能( Performance )和可修改性 (Modification)的要求較高,(1)設(shè)計策略能提高該系統(tǒng)的可用性,(2)設(shè)計策略能夠提高該系統(tǒng)的性能,(3)設(shè)計策略能夠提高該系統(tǒng)的可修改性。
(1)A.Ping/Echo
B.限制訪問
C.運行時注冊
D.接口-實現(xiàn)分離
(2)A.分層結(jié)構(gòu)
B.事務(wù)機制
C.主動兀余
D.隊列調(diào)度
(3)A.信息隱藏
B.記錄/回放
C.任務(wù)模型
D.回滾
試題解析與討論:
www.jazzmuze.com/st/1269025300.html試題參考答案:A、D、A
試題
7: 包過濾型防火墻作為比較簡單的防火墻,主要機制是檢查出入數(shù)據(jù)包()地址。
A、物理層
B、網(wǎng)絡(luò)層
C、數(shù)據(jù)鏈路層
D、應(yīng)用層
試題解析與討論:
www.jazzmuze.com/st/1272529760.html試題參考答案:B
試題
8: 逆向工程導(dǎo)出的信息可以分為實現(xiàn)級、結(jié)構(gòu)級、功能級和領(lǐng)域級四個抽象層次。程序的抽象語法樹屬于(1);反映程序分量之間相互依賴關(guān)系的信息屬于(2)。
(1)A.實現(xiàn)級
B.結(jié)構(gòu)級
C.功能級
D.領(lǐng)域級
(2)A.實現(xiàn)級
B.結(jié)構(gòu)級
C.功能級
D.領(lǐng)域級
試題解析與討論:
www.jazzmuze.com/st/1884323217.html試題參考答案:A、B
試題
9:
甲和乙要進行通信,甲對發(fā)送的消息附加了數(shù)字簽名,乙收到該消息后利用()驗證該消息的真實性。
A.甲的公鑰
B.甲的私鑰
C.乙的公鑰
D.乙的私鑰
試題解析與討論:
www.jazzmuze.com/st/2473913350.html試題參考答案:A
試題
10: The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the (71) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (72), one also has to decide whether to use a two-tier, three-tier,or n-tier architecture. Then the requirements and the architecture design are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. (73) specify the operating environment(s) in which the system must perform and how those may change over time. (74) focus on the nonfunctional requirements issues such as response time,capacity,and reliability. (75) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used.
(71)A.functional requirements
B.nonfunctional requirements
C.system constraint
D.system operational environment
(72)A.client-based architecture
B.server-based architecture
C.network architecture
D.client-server architecture
(73)A.Operational requirements
B.Speed requirement
C.Access control requirements
D.Customization requirements
(74)A.Environment requirements
B.Maintainability requirements
C.Performance requirements
D.Virus control requirements
(75)A.Safety requirements
B.Security requirements
C.Data management requirements
D.System requirements
試題解析與討論:
www.jazzmuze.com/st/3936428375.html試題參考答案:B、D、A、C、B