信息安全工程師當天每日一練試題地址:www.njjt123.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:www.njjt123.com/class/27/e6_1.html
信息安全工程師每日一練試題(2025/3/10)在線測試:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
點擊查看:更多信息安全工程師習題與指導
信息安全工程師每日一練試題內容(2025/3/10)
試題1
為了應對網絡威脅,人為劃分若干安全區(qū)域,下列不屬于安全區(qū)域的是( )查看答案
試題參考答案:D
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題2
一個Kerberos系統(tǒng)涉及四個基本實體,其中( )是識別用戶身份并提供TGS會話密鑰。查看答案
試題參考答案:D
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題3
Trust is typically interpreted as a subjective belief in the reliability, honesty and security of an entity on which we depend ( )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted( )fails , then the sytems and applications that depend on it can( )be considered secure.An often cited articulation of this principle is:" a trusted system or component is one that can break your security policy” ( which happens when the trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many.查看答案
試題參考答案:D、C、A、B、A
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題4
訪問控制的正確步驟是( )查看答案
試題參考答案:B
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題5
網絡安全等級保護工作主要包括定級、備案、( )、等級測評、監(jiān)督檢查五個階段。查看答案
試題參考答案:B
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題6
WPDRRC模型模型蘊涵的網絡安全能力不包括( )查看答案
試題參考答案:D
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題7
云計算平臺物理安全威脅的一個典型例子是( )查看答案
試題參考答案:C
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題8
( )的產品特點是部署在不同安全域之間,解析和過濾經過防火墻的數(shù)據(jù)流,集成應用識別和管控、惡意代碼防護、入侵防護、事件關聯(lián)等多種安全功能,同時具備網絡層和應用層訪問控制及過濾功能的網絡安全產品。查看答案
試題參考答案:D
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題9
研究密碼破譯的科學稱為密碼分析學。密碼分析學中,根據(jù)密碼分析者可利用的數(shù)據(jù)資源,可將攻擊密碼的類型分為四種,其中適于攻擊公開密碼體制,特別是攻擊其數(shù)字簽名的是 ( )。查看答案
試題參考答案:C
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
試題10
電子政務網絡由政務內網和政務外網構成,兩網之間( ),政務外網與互聯(lián)網之間( )。查看答案
試題參考答案:B
試題解析與討論:www.njjt123.com/exam/ExamDay.aspx?t1=6&day=2025/3/10
信管網訂閱號
信管網視頻號
信管網抖音號
溫馨提示:因考試政策、內容不斷變化與調整,信管網網站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!
信管網致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。
信管網軟考課程由信管網依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。
發(fā)表評論 查看完整評論 | |