信息安全工程師當天每日一練試題地址:http://www.pokkc.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.pokkc.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/6/1)在線測試:http://www.pokkc.com/exam/ExamDay.aspx?t1=6&day=2017/6/1
信息安全工程師每日一練試題內容(2017/6/1)
試題
1:
根據(jù)統(tǒng)計顯示,80%的網(wǎng)絡攻擊源于內部網(wǎng)絡,因此,必須加強對內部網(wǎng)絡的安全控制和防范。下面的措施中,無助于提高同一局域網(wǎng)內安全性的措施是( )。
A. 使用防病毒軟件
B. 使用日志審計系統(tǒng)
C. 使用入侵檢測系統(tǒng)
D. 使用防火墻防止內部攻擊
試題解析與討論:
http://www.pokkc.com/st/7627.html試題參考答案:D
試題
2:
基于角色的訪問控制中,角色定義、角色成員的增減、角色分配都是由( )實施的,用戶只能被動接受授權規(guī)定,不能自主地決定,用戶也不能自主地將訪問權限傳給他人,這是一種非自主型訪問控制。
A.CSO
B.安全管理員
C.稽查員或審計員
D.應用系統(tǒng)的管理員
試題解析與討論:
http://www.pokkc.com/st/23180.html試題參考答案:D
試題
3: 為了系統(tǒng)地、-完整地構建信息系統(tǒng)的安全體系框架,信息系統(tǒng)安全體系應當由()共同構建。
A. .技術體系、組織機構體系和管理體系
B.硬件、軟件、安全產(chǎn)品和管理制度
C.技術框架、產(chǎn)品、管理制度和標準
D.用戶需求、建設內容、運維管理
試題解析與討論:
http://www.pokkc.com/st/1897118507.html試題參考答案:A
試題
4: 駐留在多個網(wǎng)絡設備上的程序在短時間內同時產(chǎn)生大量的請求消息沖擊某 Web 服務器,導致該服務器不堪重負,無法正常響應其他用戶的請求,這屬于() 。
A、網(wǎng)上沖浪
B、中間人攻擊
C、DDos 攻擊
D、MAC 攻擊
試題解析與討論:
http://www.pokkc.com/st/1900314092.html試題參考答案:C
試題
5: 我國的國家秘密分為幾級?()
A、3
B、4
C、5
D、6
試題解析與討論:
http://www.pokkc.com/st/2221425959.html試題參考答案:A
試題
6:
以下哪個拒絕服務攻擊方式不是流量型拒絕服務攻擊()
A.Land
B.UDP Flood
C.Smurf
D.teardrop
試題解析與討論:
http://www.pokkc.com/st/2570616337.html試題參考答案:D
試題
7:
規(guī)范的實施流程和文檔管理,是信息安全風險評估能否取得成功的重要基礎。某單位在實施風險評估時,形成了《待評估信息系統(tǒng)相關設備及資產(chǎn)清單》。在風險評估實施的各個階段中,該《待評估信息系統(tǒng)相關設備及資產(chǎn)清單》應是如下( )中的輸出結果。
A.風險評估準備
B.風險要素識別
C.風險分析
D.風險結果判定
試題解析與討論:
http://www.pokkc.com/st/2573912391.html試題參考答案:B
試題
8:
下面對能力成熟度模型解釋最準確的是:()
A、它認為組織的能力依賴于嚴格定義、管理完善、可測可控的有效業(yè)務過程
B、它通過嚴格考察工程成果來判斷工程能力
C、它與統(tǒng)計過程控制理論的出發(fā)點不同,所以應用于不同領域
D、它是隨著信息安全的發(fā)展而誕生的重要概念
試題解析與討論:
http://www.pokkc.com/st/269961075.html試題參考答案:A
試題
9:
某系統(tǒng)被攻擊者入侵,初步懷疑為管理員存在弱口令,攻擊者從遠程終端以管理員身份登錄進行系統(tǒng)進行了相應的破壞,驗證此事應查看:()
A.系統(tǒng)日志
B.應用程序日志
C.安全日志
D.IIS日志
試題解析與討論:
http://www.pokkc.com/st/270922165.html試題參考答案:C
試題
10:
在 Windows 2000中可以察看開放端口情況的是:()
A.nbtstat
B. net
C. net show
D.netstat
試題解析與討論:
http://www.pokkc.com/st/2720628945.html試題參考答案:D
試題
11: Which of the following should be a concern to an IS auditor reviewing a wireless network?
A、128-bit static-key WEP (Wired Equivalent Privacy) encryption is enabled.
B、SSID (Service Set IDentifier) broadcasting has been enabled.
C、Antivirus software has been installed in all wireless clients.
D、MAC (Media Access Control) access control filtering has been deployed.
試題解析與討論:
http://www.pokkc.com/st/293035464.html試題參考答案:B
試題
12: When reviewing an intrusion detection system (IDS), an IS auditor should be MOST concerned about which of the following?
A、Number of nonthreatening events identified as threatening
B、Attacks not being identified by the system
C、Reports/logs being produced by an automated tool
D、Legitimate traffic being blocked by the system
試題解析與討論:
http://www.pokkc.com/st/293581148.html試題參考答案:B
試題
13: In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should:
A、identify and assess the risk assessment process used by management.
B、identify information assets and the underlying systems.
C、disclose the threats and impacts to management.
D、identify and evaluate the existing controls.
試題解析與討論:
http://www.pokkc.com/st/2951027327.html試題參考答案:D
試題
14: Overall business risk for a particular threat can be expressed as:
A、a product of the probability and magnitude of the impact if a threat successfully exploits a vulnerability.
B、the magnitude of the impact should a threat source successfully exploit the vulnerability.
C、the likelihood of a given threat source exploiting a given vulnerability.
D、the collective judgment of the risk assessment team.
試題解析與討論:
http://www.pokkc.com/st/2956519321.html試題參考答案:A
試題
15: An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely:
A、check to ensure that the type of transaction is valid for the card type.
B、verify the format of the number entered then locate it on the database.
C、ensure that the transaction entered is within the cardholder's credit limit.
D、confirm that the card is not shown as lost or stolen on the master file.
試題解析與討論:
http://www.pokkc.com/st/2959318950.html試題參考答案:B
試題
16: When planning to add personnel to tasks imposing time constraints on the duration of a project, which of the following should be revalidated FIRST ?
A、The project budget
B、The critical path for the project
C、The length of the remaining tasks
D、The personnel assigned to other tasks
試題解析與討論:
http://www.pokkc.com/st/296956310.html試題參考答案:B
試題
17: Which of the following acts as a decoy to detect active Internet attacks?
A、Honeypots
B、Firewalls
C、Trapdoors
D、Traffic analysis
試題解析與討論:
http://www.pokkc.com/st/2970510908.html試題參考答案:A
試題
18: When reviewing a hardware maintenance program, an IS auditor should assess whether:
A、the schedule of all unplanned maintenance is maintained.
B、it is in line with historical trends.
C、it has been approved by the IS steering committee.
D、the program is validated against vendor specifications.
試題解析與討論:
http://www.pokkc.com/st/2984120081.html試題參考答案:D
試題
19: 信息系統(tǒng)審計師回顧組織的風險估價流程時應首先:()
A、鑒別對于信息資產(chǎn)威脅的合理性
B、分析技術和組織弱點
C、鑒別并對信息資產(chǎn)進行分級
D、對潛在的安全漏洞效果進行評價
試題解析與討論:
http://www.pokkc.com/st/3013524342.html試題參考答案:C
試題
20: 一個是審計師在檢查電信公司提供網(wǎng)際網(wǎng)路連線服務,商場為他們的無線客戶。該公司使用的無線傳輸層安全性( WTLS的)和安全套接字層( SSL )技術,保護其客戶的付款信息。該審計師最關心的是黑客:()
A.考慮無線應用協(xié)議( WAP )網(wǎng)關安全。
B.在服務器前安裝流量監(jiān)控工具
C.偷盜客戶的PDA設備
D.監(jiān)聽無線數(shù)據(jù)傳輸
試題解析與討論:
http://www.pokkc.com/st/302027560.html試題參考答案:A