信息安全工程師當(dāng)天每日一練試題地址:m.jazzmuze.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:m.jazzmuze.com/class/27/e6_1.html
信息安全工程師每日一練試題(2022/3/20)在線測(cè)試:m.jazzmuze.com/exam/ExamDay.aspx?t1=6&day=2022/3/20
點(diǎn)擊查看:更多信息安全工程師習(xí)題與指導(dǎo)
信息安全工程師每日一練試題內(nèi)容(2022/3/20)
試題1
以下關(guān)于安全套接層協(xié)議(SSL)的敘述中,錯(cuò)誤的是()
A、是一種應(yīng)用層安全協(xié)議
B、為TCP/IP連接提供數(shù)據(jù)加密
C、為TCP/IP連接提供服務(wù)器認(rèn)證
D、提供數(shù)據(jù)安全機(jī)制
查看答案
試題參考答案:A
試題解析與討論:m.jazzmuze.com/st/284953163.html
試題2
計(jì)算機(jī)犯罪是指利用信息科學(xué)技術(shù)且以計(jì)算機(jī)為犯罪對(duì)象的犯罪行為,與其他類型的犯罪相比,具有明顯的特征,下列說法中錯(cuò)誤的是( )。查看答案
試題參考答案:C
試題3
Snort是一款開源的網(wǎng)絡(luò)入侵檢測(cè)系統(tǒng),它能夠執(zhí)行實(shí)時(shí)流量分析和IP協(xié)議網(wǎng)絡(luò)的數(shù)據(jù)包記錄。以下不屬于Snort配置模式的是( )。查看答案
試題參考答案:C
試題4
有一些信息安全事件是由于信息系統(tǒng)中多個(gè)部分共同作用造成的,人們稱這類事件為“多組件事故”,應(yīng)對(duì)這類安全事件最有效的方法是( )。查看答案
試題參考答案:D
試題解析與討論:m.jazzmuze.com/st/411193924.html
試題5
電子商務(wù)系統(tǒng)除了面臨一般的信息系統(tǒng)所涉及的安全威脅之外,更容易成為黑客分子的攻擊目標(biāo),其安全性需求普遍高于一般的信息系統(tǒng),電子商務(wù)系統(tǒng)中的信息安全需求不包括()
A、交易的真實(shí)性
B、交易的保密性和完整性
C、交易的可撤銷性
D、交易的不可抵賴性
查看答案
試題參考答案:C
試題解析與討論:m.jazzmuze.com/st/284539359.html
試題6
計(jì)算機(jī)取證主要是對(duì)電子證據(jù)的獲取、分析、歸檔和描述的過程,而電子證據(jù)需要在法庭上作為證據(jù)展示,進(jìn)行計(jì)算機(jī)取證時(shí)應(yīng)當(dāng)充分考慮電子證據(jù)的真實(shí)性和電子證據(jù)的證明力,除了相關(guān)準(zhǔn)備之外,計(jì)算機(jī)取證步驟通常不包括()查看答案
試題參考答案:D
試題解析與討論:m.jazzmuze.com/st/326941650.html
試題7
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
試題參考答案:C、B、C、D、A
試題解析與討論:m.jazzmuze.com/st/32757467.html
試題8
面向數(shù)據(jù)挖掘的隱私保護(hù)技術(shù)主要解決高層應(yīng)用中的隱私保護(hù)問題,致力于研究如何根據(jù)不同數(shù)據(jù)挖掘操作的特征來實(shí)現(xiàn)對(duì)隱私的保護(hù)。從數(shù)據(jù)挖掘的角度看,不屬于隱私保護(hù)技術(shù)的是()。查看答案
試題參考答案:C
試題9
包過濾技術(shù)防火墻在過濾數(shù)據(jù)包時(shí),一般不關(guān)心()
A、數(shù)據(jù)包的源地址
B、數(shù)據(jù)包的協(xié)議類型
C、數(shù)據(jù)包的目的地址
D、數(shù)據(jù)包的內(nèi)容
查看答案
試題參考答案:D
試題解析與討論:m.jazzmuze.com/st/285063318.html
試題10
S/key口令是一種一次性口令生成方案,它可以對(duì)抗( )。查看答案
試題參考答案:C
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請(qǐng)以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,官方教材參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識(shí)與高頻考點(diǎn),為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評(píng)論 查看完整評(píng)論 | |