信息安全工程師當(dāng)天每日一練試題地址:www.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2020/10/23)在線測(cè)試:www.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2020/10/23
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2020/10/23)
試題
1: 蠕蟲(chóng)、特洛伊木馬和病毒其實(shí)是一回事()
A、對(duì)
B、錯(cuò)
試題解析與討論:
www.jazzmuze.com/st/2405510644.html試題參考答案:B
試題
2: APT攻擊是一種以商業(yè)或者政治目的為前提的特定攻擊,其中攻擊者采用口令竊聽(tīng)、漏洞攻擊等方式嘗試進(jìn)一步入侵組織內(nèi)部的個(gè)人電腦和服務(wù)器,不斷提升自己的權(quán)限,直至獲得核心電腦和服務(wù)器控制權(quán)的過(guò)程被稱為( )。
A.情報(bào)收集
B.防線突破
C.橫向滲透
D.通道建立
試題解析與討論:
www.jazzmuze.com/st/4113228043.html試題參考答案:C
試題
3: 對(duì)日志數(shù)據(jù)進(jìn)行審計(jì)檢查,屬于()類控制措施。
A.預(yù)防
B.檢查
C.威懾
D.修正
試題解析與討論:
www.jazzmuze.com/st/3270715804.html試題參考答案:B
試題
4: Applying a retention date on a file will ensure that:
A、data cannot be read until the date is set.
B、data will not be deleted before that date.
C、backup copies are not retained after that date.
D、datasets having the same name are differentiated.
試題解析與討論:
www.jazzmuze.com/st/2949329608.html試題參考答案:B
試題
5:
網(wǎng)絡(luò)安全領(lǐng)域,把已經(jīng)被發(fā)現(xiàn),但相關(guān)軟件廠商還沒(méi)有進(jìn)行修復(fù)的漏洞叫什么漏洞?()
A、 0day漏洞
B、 DDAY漏洞
C、 無(wú)痕漏洞
D、 黑客漏洞
試題解析與討論:
www.jazzmuze.com/st/2669122042.html試題參考答案:A
試題
6: 一個(gè)IS審計(jì)師應(yīng)該擔(dān)憂當(dāng)一個(gè)電信分析員()
A、監(jiān)視系統(tǒng)表現(xiàn)和對(duì)程序變化的跟蹤問(wèn)題報(bào)告
B、根據(jù)現(xiàn)在的和將來(lái)的處理需求來(lái)檢查網(wǎng)絡(luò)負(fù)載需求
C、評(píng)估網(wǎng)絡(luò)負(fù)載的終端反應(yīng)時(shí)間和網(wǎng)絡(luò)數(shù)據(jù)傳輸速率的效果
D、推薦網(wǎng)絡(luò)平衡過(guò)程和改進(jìn)措施
試題解析與討論:
www.jazzmuze.com/st/2996924581.html試題參考答案:A
試題
7:
以下對(duì)跨站腳本攻擊(XSS)的解釋最準(zhǔn)確的一項(xiàng)是: ()
A、引誘用戶點(diǎn)擊虛假網(wǎng)絡(luò)鏈接的一種攻擊方法
B、構(gòu)造精妙的關(guān)系數(shù)據(jù)庫(kù)的結(jié)構(gòu)化查詢語(yǔ)言對(duì)數(shù)據(jù)庫(kù)進(jìn)行非法的訪問(wèn)
C、一種很強(qiáng)大的木馬攻擊手段
D、將惡意代碼嵌入到用戶瀏覽的WEB網(wǎng)頁(yè)中,從而達(dá)到惡意的目的
試題解析與討論:
www.jazzmuze.com/st/264451157.html試題參考答案:D
試題
8: SM3密碼雜湊算法的消息分組長(zhǎng)度為( )比特。
A.64
B.128
C.512
D.1024
試題解析與討論:
www.jazzmuze.com/st/3899024824.html試題參考答案:C
試題
9: After observing suspicious activities in a server, a manager requests a forensic analysis. Which of the following findings should be of MOST concern to the investigator?
A、Server is a member of a workgroup and not part of the server domain
B、Guest account is enabled on the server
C、Recently, 100 users were created in the server
D、Audit logs are not enabled for the server
試題解析與討論:
www.jazzmuze.com/st/2932621693.html試題參考答案:D
試題
10: Which of the following activities should the business continuity manager perform FIRST after the replacement of hardware at the primary information processing facility?
A、Verify compatibility with the hot site.
B、Review the implementation report.
C、Perform a walk-through of the disaster recovery plan.
D、Update the IS assets inventory.
試題解析與討論:
www.jazzmuze.com/st/2918213952.html試題參考答案:D