91成人精品一区在线播放,成人毛片在线播放器,国产精品剧情av,日韩尤物在线,亚洲麻豆视频,岛国免费在线,亚洲a欧美

專業(yè)信息安全工程師網站|服務平臺|服務商(信息安全工程師學習QQ群:327677606,客服QQ:800184589)

軟題庫 學習課程
當前位置:信管網 >> 信息安全工程師 >> 每日一練 >> 文章內容
信息安全工程師每日一練試題(2024/6/29)

信息安全工程師當天每日一練試題地址:www.shc2b.com/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:www.shc2b.com/class/27/e6_1.html

信息安全工程師每日一練試題(2024/6/29)在線測試:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

點擊查看:更多信息安全工程師習題與指導

信息安全工程師每日一練試題內容(2024/6/29)

  • 試題1

    根據(jù)自主可控的安全需求,近些年國密算法和標準體系受到越來越多的關注,基于國密算法的應用也得到了快速發(fā)展。我國國密標準中的雜湊算法是()
    A.SM2
    B.SM3
    C.SM4
    D.SM9

    查看答案

    試題參考答案:B

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題2

    研究密碼破譯的科學稱為密碼分析學。密碼分析學中,根據(jù)密碼分析者可利用的數(shù)據(jù)資源,可將攻擊密碼的類型分為四種,其中適于攻擊公開密碼體制,特別是攻擊其數(shù)字簽名的是 (  )。
    A、僅知密文攻擊
    B、已知明文攻擊
    C、選擇密文攻擊
    D、選擇明文攻擊

    查看答案

    試題參考答案:C

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題3

    The modern study of symmetric-key ciphers relates mainly to the study of block ciphers and stream ciphers and to their applications. A block cipher is, in a sense, a modern embodiment of Alberti's polyalphabetic cipher: block ciphers take as input a block of (71 )and a key, and output a block of ciphertext of the same size. Since messages are almost always longer than a single block, some method of knitting together successive blocks is required. Several have been developed, some with better security in one aspect or another than others. They are the mode of operations and must be carefully considered when using a block cipher in a cryptosystem.
    The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are( 72 )designs which have been designated cryptography standards by the US government (though DES's designation was finally withdrawn after the AES was adopted). Despite its deprecation as an official standard, DES (especially its still-approved and much more secure triple-DES variant) remains quite popular; it is used across a wide range of applications, from ATM encryption to e-mail privacy and secure remote access. Many other block ciphers have been designed and released, with considerable variation in quality. Many have been thoroughly broken. See Category: Block ciphers.
    Stream ciphers, in contrast to the ‘block’ type, create an arbitrarily long stream of key material, which is combined ( 73 )the plaintext bit-by-bit or character-by-character, somewhat like the one-time pad. In a stream cipher, the output( 74 )is created based on an internal state which changes as the cipher operates. That state change is controlled by the key, and, in some stream ciphers, by the plaintext stream as well. RC4 is an example of a well-known, and widely used, stream cipher; see Category: Stream ciphers.
    Cryptographic hash functions (often called message digest functions) do not necessarily use keys, but are a related and important class of cryptographic algorithms. They take input data (often an entire message), and output a short fixed length hash, and do so as a one-way function. For good ones, ( 75 ) (two plaintexts which produce the same hash) are extremely difficult to find.
    Message authentication codes (MACs) are much like cryptographic hash functions, except that a secret key is used to authenticate the hash value on receipt. These block an attack against plain hash functions.
    (71)
    A.plaintext
    B.ciphertext
    C.data
    D.hash
    (72)
    A.stream cipher
    B.hash function
    C.Message authentication code
    D.Block cipher
    (73)
    A.of
    B.for
    C.with
    D.in
    (74)
    A.hash
    B.stream
    C.ciphertext
    D.plaintext
    (75)
    A.collisions
    B.image
    C.preimage
    D.solution

    查看答案

    試題參考答案:A、D、C、B、A

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題4

    安全滲透測試通過模擬攻擊者對測評對象進行安全攻擊,以驗證安全防護機制的有效性。其中需要提供部分測試對象信息,測試團隊根據(jù)所獲取的信息,模擬不同級別的威脅者進行滲透測試,這屬于(    )。
    A.黑盒測試
    B.白盒測試
    C.灰盒測試
    D.盲盒測試

    查看答案

    試題參考答案:C

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題5

    計算機取證是將計算機調查和分析技術應用于對潛在的、有法律效應的確定和提取。以下關于計算機取證的描述中,錯誤的是()
    A、計算機取證包括對以磁介質編碼信息方式存儲的計算機證據(jù)的提取和歸檔
    B、計算機取證圍繞電子證據(jù)進行,電子證據(jù)具有高科技性等特點
    C、計算機取證包括保護目標計算機系統(tǒng),確定收集和保存電子證據(jù),必須在開計算機的狀態(tài)下進行
    D、計算機取證是一門在犯罪進行過程中或之后收集證據(jù)

    查看答案

    試題參考答案:C

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題6

    密碼分析的目的是()
    A.發(fā)現(xiàn)加密算法
    B.發(fā)現(xiàn)密鑰或者密文對應的明文
    C.發(fā)現(xiàn)解密算法
    D.發(fā)現(xiàn)攻擊者

    查看答案

    試題參考答案:B

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題7

    在缺省安裝數(shù)據(jù)庫管理系統(tǒng)MySQL后,root用戶擁有所有權限且是空口令,為了安全起見,必須為root用戶設置口令,以下口令設置方法中,不正確的是(  )。
    A.使用MySQL自帶的命令mysqladmin設置root口令
    B.使用setpassword設置口令
    C.登錄數(shù)據(jù)庫,修改數(shù)據(jù)庫mysql下user表的字段內容設置口令
    D.登錄數(shù)據(jù)庫,修改數(shù)據(jù)庫mysql下的訪問控制列表內容設置口令

    查看答案

    試題參考答案:D

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題8

    在信息安全防護體系設計中,保證“信息系統(tǒng)中數(shù)據(jù)不被非法修改、破壞、丟失等”是為了達到防護體系的()目標。
    A.可用性
    B.保密性
    C.可控性
    D.完整性

    查看答案

    試題參考答案:D

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題9

    計算機網絡為了實現(xiàn)資源共享,采用協(xié)議分層設計思想,每層網絡協(xié)議都有地址信息,如網卡(MAC)地址、IP地址、端口地址和域名地址,以下有關上述地址轉換的描述錯誤的是 (   )。
    A.DHCP協(xié)議可以完成IP地址和端口地址的轉換
    B.DNS協(xié)議可以實現(xiàn)域名地址和IP地址之間的轉換
    C.ARP協(xié)議可以實現(xiàn)MAC地址和IP地址之間的轉換
    D.域名地址和端口地址無法轉換

    查看答案

    試題參考答案:A

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

  • 試題10

    蜜罐技術是一種主動防御技術,是入侵檢測技術的一個重要發(fā)展方向。蜜罐有四種不同置方式:誘騙服務、弱化系統(tǒng)、強化系統(tǒng)和用戶模式服務器,其中在特定IP服務端口進行偵聽并對其他應用程序的各種網絡請求進行應答,這種應用程序屬于()
    A.誘騙服務
    B.弱化系統(tǒng)
    C.強化系統(tǒng)
    D.用戶模式服務器

    查看答案

    試題參考答案:A

    試題解析與討論:www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2024/6/29

信管網訂閱號

信管網視頻號

信管網抖音號

溫馨提示:因考試政策、內容不斷變化與調整,信管網網站提供的以上信息僅供參考,如有異議,請以權威部門公布的內容為準!

信管網致力于為廣大信管從業(yè)人員、愛好者、大學生提供專業(yè)、高質量的課程和服務,解決其考試證書、技能提升和就業(yè)的需求。

信管網軟考課程由信管網依托10年專業(yè)軟考教研傾力打造,教材和資料參編作者和資深講師坐鎮(zhèn),通過深研歷年考試出題規(guī)律與考試大綱,深挖核心知識與高頻考點,為學員考試保駕護航。面授、直播&錄播,多種班型靈活學習,滿足不同學員考證需求,降低課程學習難度,使學習效果事半功倍。

相關內容

發(fā)表評論  查看完整評論  

推薦文章

精選

課程

提問

評論

收藏