信息安全工程師當(dāng)天每日一練試題地址:www.tronclassroom.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.tronclassroom.com/class/27/e6_1.html
信息安全工程師每日一練試題(2023/5/2)在線測試:www.tronclassroom.com/exam/ExamDay.aspx?t1=6&day=2023/5/2
信息安全工程師每日一練試題內(nèi)容(2023/5/2)
試題1
報文內(nèi)容認(rèn)證使接收方能夠確認(rèn)報文內(nèi)容的真實性,產(chǎn)生認(rèn)證碼的方式不包括().查看答案
試題參考答案:B
試題2
密碼工作是黨和國家的一項特殊重要工作,直接關(guān)系國家政治安全、經(jīng)濟(jì)安全、國防安全和信息安全。密碼法的通過對全面提升密碼工作法治化水平起到了關(guān)鍵性作用。密碼法規(guī)定國家對密碼實行分類管理,密碼分類中不包含()查看答案
試題參考答案:D
試題3
為確保關(guān)鍵信息基礎(chǔ)設(shè)施供應(yīng)鏈安全,維護(hù)國家安全,依據(jù)(),2020年4月27日,國家互聯(lián)網(wǎng)信息辦公室等12個部門聯(lián)合發(fā)布了《網(wǎng)絡(luò)安全審查辦法》,該辦法自2020年6月1日實施,將重點評估采購網(wǎng)絡(luò)產(chǎn)品和服務(wù)可能帶來的國家安全風(fēng)險。查看答案
試題參考答案:A
試題4
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
試題參考答案:C、B、C、D、A
試題5
已知DES算法S盒如下:查看答案
試題參考答案:C
試題6
()是一種通過對信息進(jìn)行均衡、安全的防護(hù),提高整個系統(tǒng)最低安全性能的原則。查看答案
試題參考答案:A
試題7
Kerberos是一種常用的身份認(rèn)證協(xié)議,它采用的加密算法是( )。查看答案
試題參考答案:B
試題8
注入語句:http://xxx.xxx.xxx/abc.asp?p=YY and user>0不僅可以判斷服務(wù)器的后臺數(shù)據(jù)庫是否為SQL-SERVER,還可以得到()
A、當(dāng)前連接數(shù)據(jù)庫的用戶數(shù)據(jù)
B、當(dāng)前連接數(shù)據(jù)庫的用戶名
C、當(dāng)前連接數(shù)據(jù)庫的用戶口令
D、當(dāng)前連接的數(shù)據(jù)庫名
查看答案
試題參考答案:B
試題9
計算機(jī)病毒是指一種能夠通過自身復(fù)制傳染,起破壞作用的計算機(jī)程序,目前使用的防殺病毒軟件的主要作用是( )。查看答案
試題參考答案:D
試題10
網(wǎng)絡(luò)安全漏洞是網(wǎng)絡(luò)安全管理工作的重要內(nèi)容,網(wǎng)絡(luò)信息系統(tǒng)的漏洞主要來自兩個方面:非技術(shù)性安全漏洞和技術(shù)性安全漏洞。以下屬于非技術(shù)性安全漏洞主要來源的是 ( )查看答案
試題參考答案:C
信管網(wǎng)訂閱號
信管網(wǎng)視頻號
信管網(wǎng)抖音號
溫馨提示:因考試政策、內(nèi)容不斷變化與調(diào)整,信管網(wǎng)網(wǎng)站提供的以上信息僅供參考,如有異議,請以權(quán)威部門公布的內(nèi)容為準(zhǔn)!
信管網(wǎng)致力于為廣大信管從業(yè)人員、愛好者、大學(xué)生提供專業(yè)、高質(zhì)量的課程和服務(wù),解決其考試證書、技能提升和就業(yè)的需求。
信管網(wǎng)軟考課程由信管網(wǎng)依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學(xué)員考試保駕護(hù)航。面授、直播&錄播,多種班型靈活學(xué)習(xí),滿足不同學(xué)員考證需求,降低課程學(xué)習(xí)難度,使學(xué)習(xí)效果事半功倍。
發(fā)表評論 查看完整評論 | |