信息安全工程師當天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/4/28)在線測試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2020/4/28
點擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/4/28)
試題
1: Which of the following is a control over component communication failure/errors?
A、Restricting operator access and maintaining audit trails
B、Monitoring and reviewing system engineering activity
C、Providing network redundancy
D、Establishing physical barriers to the data transmitted over the network
試題解析與討論:
www.jazzmuze.com/st/2918316155.html試題參考答案:C
試題
2: In determining the acceptable time period for the resumption of critical business processes:
A、only downtime costs need to be considered.
B、recovery operations should be analyzed.
C、both downtime costs and recovery costs need to be evaluated.
D、indirect downtime costs should be ignored.
試題解析與討論:
www.jazzmuze.com/st/296309779.html試題參考答案:C
試題
3:
微信收到“微信團隊”的安全提示:“您的微信賬號在16:46嘗試在另一個設(shè)備登錄。登錄設(shè)備:XX品牌XX型號”。這時我們應(yīng)該怎么做( )
A、 有可能是誤報,不用理睬
B、 確認是否是自己的設(shè)備登錄,如果不是,則盡快修改密碼
C、 自己的密碼足夠復(fù)雜,不可能被破解,堅決不修改密碼
D、 撥打110報警,讓警察來解決
試題解析與討論:
www.jazzmuze.com/st/266515142.html試題參考答案:B
試題
4:
下列哪個是蠕蟲的特性?()
A.不感染、依附性
B.不感染、獨立性
C.可感染、依附性
D.可感染、獨立性
試題解析與討論:
www.jazzmuze.com/st/27052869.html試題參考答案:D
試題
5:
簡單包過濾防火墻主要工作在()
A、鏈路層/網(wǎng)絡(luò)層
B、網(wǎng)絡(luò)層/傳輸層
C、應(yīng)用層
D、會話層
試題解析與討論:
www.jazzmuze.com/st/273451894.html試題參考答案:B
試題
6: The PRIMARY objective of service-level management (SLM) is to:
A、define, agree, record and manage the required levels of service.
B、ensure that services are managed to deliver the highest achievable level of availability.
C、keep the costs associated with any service at a minimum.
D、monitor and report any legal noncompliance to business management.
試題解析與討論:
www.jazzmuze.com/st/295808213.html試題參考答案:A
試題
7: Which of the following is the MOST effective method for dealing with the spreading of a network worm that exploits vulnerability in a protocol?
A、Install the vendor's security fix for the vulnerability.
B、Block the protocol traffic in the perimeter firewall.
C、Block the protocol traffic between internal network segments.
D、Stop the service until an appropriate security fix is installed.
試題解析與討論:
www.jazzmuze.com/st/2962223504.html試題參考答案:D
試題
8:
某公司在執(zhí)行災(zāi)難恢復(fù)測試時.信息安全專業(yè)人員注意到災(zāi)難恢復(fù)站點的服務(wù)器的運行速度緩慢,為了找到根本愿因,他應(yīng)該首先檢查:()
A.災(zāi)難恢復(fù)站點的錯誤事件報告
B.災(zāi)難恢復(fù)測試計劃
C.災(zāi)難恢復(fù)計劃(DRP)
D.主站點和災(zāi)難恢復(fù)站點的配置文件
試題解析與討論:
www.jazzmuze.com/st/2566622626.html試題參考答案:D
試題
9: 信息隱藏主要研究如何將機密信息秘密隱藏于另一公開的信息中。以下關(guān)于利用多媒體數(shù)據(jù)來隱藏機密信息的敘述中,錯誤的是()。
A.多媒體信息本身有很大的冗余性
B.多媒體信息本身編碼效率很高
C.人眼或人耳對某些信息由一定的掩蔽效應(yīng)
D.信息嵌入到多媒體信息中不影響多媒體本身的傳送和使用
試題解析與討論:
www.jazzmuze.com/st/3274529101.html試題參考答案:B
試題
10: Which of the following should be considered FIRST when implementing a risk management program?
A、An understanding of the organization's threat, vulnerability and risk profile
B、An understanding of the risk exposures and the potential consequences of compromise
C、A determination of risk management priorities based on potential consequences
D、A risk mitigation strategy sufficient to keep risk consequences at an acceptable level
試題解析與討論:
www.jazzmuze.com/st/298272626.html試題參考答案:A