信息安全工程師當天每日一練試題地址:www.pokkc.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.pokkc.com/class/27/e6_1.html
信息安全工程師每日一練試題(2022/4/10)在線測試:www.pokkc.com/exam/ExamDay.aspx?t1=6&day=2022/4/10
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2022/4/10)
試題1
不屬于物理安全威脅的是( )。查看答案
試題參考答案:D
試題解析與討論:www.pokkc.com/st/3897917382.html
試題2
電子郵件是傳播惡意代碼的重要途徑,為了防止電子郵件中的惡意代碼的攻擊,用()方式閱讀電子郵件
A、網頁
B、純文本
C、程序
D、會話
查看答案
試題參考答案:B
試題解析與討論:www.pokkc.com/st/284683158.html
試題3
僵尸網絡是指采用一種或多種傳播手段, 將大量主機感染bot程序, 從而在控制者和被感染主機之間形成的一個可以一對多控制的網絡。以下不屬于低尸網絡傳播過程常見方式的是()查看答案
試題參考答案:C
試題解析與討論:www.pokkc.com/st/501914322.html
試題4
容災的目的和實質是()查看答案
試題參考答案:C
試題解析與討論:www.pokkc.com/st/3271523601.html
試題5
在安全評估過程中,采?。ǎ┦侄?,可以模擬黑客入侵過程,檢測系統(tǒng)安全脆弱性。查看答案
試題參考答案:C
試題解析與討論:www.pokkc.com/st/5023413493.html
試題6
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
試題參考答案:D、C、A、B、A
試題解析與討論:www.pokkc.com/st/389944612.html
試題7
涉及國家安全、國計民生、社會公共利益的商用密碼產品與使用網絡關鍵設備和網絡安全專用產品的商用密碼服務實行()檢測認證制度。查看答案
試題參考答案:D
試題解析與討論:www.pokkc.com/st/5022616847.html
試題8
未授權的實體得到了數(shù)據(jù)的訪問權,這屬于對安全的()
A、機密性
B、完整性
C、合法性
D、可用性
查看答案
試題參考答案:A
試題解析與討論:www.pokkc.com/st/2845724103.html
試題9
PKI中撤銷證書是通過維護一個證書撤銷列表CRL來實現(xiàn)的。以下不會導致證書被撤銷的是( )。查看答案
試題參考答案:B
試題解析與討論:www.pokkc.com/st/4114120079.html
試題10
按照行為和功能特性,特洛伊木馬可以分為遠程控制型木馬、信息竊取型木馬和破壞型木馬等。以下不屬于遠程控制型木馬的是()。查看答案
試題參考答案:D
試題解析與討論:www.pokkc.com/st/5020812505.html
溫馨提示:因考試政策、內容不斷變化與調整,信管網網站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!
信管網致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網軟考課程由信管網依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |