信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/6/29)在線測試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2020/6/29
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/6/29)
試題
1: Before implementing controls, management should FIRST ensure that the controls:
A、satisfy a requirement in addressing a risk issue.
B、do not reduce productivity.
C、are based on a cost-benefit analysis.
D、are detective or corrective.
試題解析與討論:
www.jazzmuze.com/st/295484037.html試題參考答案:
試題
2: With respect to the outsourcing of IT services, which of the following conditions should be of GREATEST concern to an IS auditor?
A、Outsourced activities are core and provide a differentiated advantage to the organization.
B、Periodic renegotiation is specified in the outsourcing contract.
C、The outsourcing contract fails to cover every action required by the arrangement.
D、Similar activities are outsourced to more than one vendor.
試題解析與討論:
www.jazzmuze.com/st/2968720860.html試題參考答案:A
試題
3: When assessing the design of network monitoring controls, an IS auditor should FIRST review network:
A、topology diagrams.
B、bandwidth usage.
C、traffic analysis reports.
D、bottleneck locations.
試題解析與討論:
www.jazzmuze.com/st/2971413062.html試題參考答案:A
試題
4: While reviewing the IT infrastructure, an IS auditor notices that storage resources are continuously being added. The IS auditor should:
A、recommend the use of disk mirroring.
B、review the adequacy of offsite storage.
C、review the capacity management process.
D、recommend the use of a compression algorithm.
試題解析與討論:
www.jazzmuze.com/st/2948015006.html試題參考答案:C
試題
5:
安全模型是用于精確和形式地描述信息系統(tǒng)的安全特征,解釋系統(tǒng)安全相關(guān)行為。關(guān)于它的作用描述不正確的是?()
A.準(zhǔn)確的描述安全的重要方面與系統(tǒng)行為的關(guān)系。
B.開發(fā)出一套安全性評估準(zhǔn)則,和關(guān)鍵的描述變量。
C.提高對成功實現(xiàn)關(guān)鍵安全需求的理解層次。
D.強(qiáng)調(diào)了風(fēng)險評估的重要性。
試題解析與討論:
www.jazzmuze.com/st/2631826425.html試題參考答案:D
試題
6:
某網(wǎng)站在設(shè)計對經(jīng)過了威脅建模和攻擊面分析,在開發(fā)時要求程序員編寫安全的代碼,但是在部署時由于管理員將備份存放在WED 目錄下導(dǎo)致了攻擊者可直接下載備份,為了發(fā)現(xiàn)系統(tǒng)中是否存在其他類擬問題,一下那種測試方式是最佳的測試方法。()
A.模糊測試
B.源代碼測試
C.滲透測試
D.軟件功能測試
試題解析與討論:
www.jazzmuze.com/st/257977906.html試題參考答案:C
試題
7:
我國信息安全事件分級分為以下哪些級別()
A.特別重大事件-重大事件-較大事件-一般事件
B.特別重大事件-重大事件-嚴(yán)重事件-較大事件-一般事件
C.特別嚴(yán)重事件-嚴(yán)重事件-重大事件-較大事件-一般事件
D.特別嚴(yán)重事件-嚴(yán)重事件-較大事件-一般事件
試題解析與討論:
www.jazzmuze.com/st/261265895.html試題參考答案:A
試題
8:
關(guān)于信息安全保障的概念,下面說法錯誤的是:()
A.信息系統(tǒng)面臨的風(fēng)險和威脅是動態(tài)變化的,信息安全保障強(qiáng)調(diào)動態(tài)的安全理念
B.信息安全保障已從單純的保護(hù)和防御階段發(fā)展為集保護(hù)、檢測和響應(yīng)為一體的綜合階段
C.在全球互聯(lián)互通的網(wǎng)絡(luò)空間環(huán)境下,可單純依靠技術(shù)措施來保障信息安全
D.信息安全保障把信息安全從技術(shù)擴(kuò)展到管理,通過技術(shù)、管理和工程等措施的綜合融合,形成對信息、信息系統(tǒng)及業(yè)務(wù)使命的保障
試題解析與討論:
www.jazzmuze.com/st/2748321036.html試題參考答案:C
試題
9: After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend?
A、Stress
B、Black box
C、Interface
D、System
試題解析與討論:
www.jazzmuze.com/st/2966318299.html試題參考答案:D
試題
10: In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems?
A、Maintaining system software parameters
B、Ensuring periodic dumps of transaction logs
C、Ensuring grandfather-father-son file backups
D、Maintaining important data at an offsite location
試題解析與討論:
www.jazzmuze.com/st/292277740.html試題參考答案:B