信息安全工程師當(dāng)天每日一練試題地址:http://www.shc2b.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.shc2b.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/4/4)在線測(cè)試:http://www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2017/4/4
信息安全工程師每日一練試題內(nèi)容(2017/4/4)
試題
1:
網(wǎng)絡(luò)安全包含了網(wǎng)絡(luò)信息的可用性、保密性、完整性和真實(shí)性。防范Dos攻擊是提高(1)的措施,數(shù)字簽名是保證(2)的措施。
(1)A.可用性
B.保密性
C.完整性
D.真實(shí)性
(2)A.可用性
B.保密性
C.完整性
D.真實(shí)性
試題解析與討論:
http://www.shc2b.com/st/413143.html試題參考答案:A、D
試題
2: 選擇產(chǎn)品主要是看品牌與價(jià)格,尤其是價(jià)格越貴越好()
A、是
B、否
試題解析與討論:
http://www.shc2b.com/st/2424821405.html試題參考答案:B
試題
3:
下面威脅中不屬于抵賴行為的是:()
A、發(fā)信者事后否認(rèn)曾經(jīng)發(fā)送過(guò)某條消息
B、收信者事后否認(rèn)曾經(jīng)接收過(guò)某條消息
C、發(fā)信者事后否認(rèn)曾經(jīng)發(fā)送過(guò)某條消息的內(nèi)容
D、收信者接收消息后更改某部分內(nèi)容
試題解析與討論:
http://www.shc2b.com/st/269728697.html試題參考答案:D
試題
4:
應(yīng)急方法學(xué)定義了安全事件處理的流程,這個(gè)流程的順序是:()
A、準(zhǔn)備-遏制-檢測(cè)-根除-恢復(fù)-跟進(jìn)
B、準(zhǔn)備-檢測(cè)-遏制-恢復(fù)-根除-跟進(jìn)
C、準(zhǔn)備-檢測(cè)-遏制-根除-恢復(fù)-跟進(jìn)
D、準(zhǔn)備-遏制-根除-檢測(cè)-恢復(fù)-跟進(jìn)
試題解析與討論:
http://www.shc2b.com/st/2699029344.html試題參考答案:C
試題
5: An IS auditor finds that conference rooms have active network ports. Which of the following is MOST important to ensure?
A、The corporate network is using an intrusion prevention system (IPS)
B、This part of the network is isolated from the corporate network
C、A single sign-on has been implemented in the corporate network
D、Antivirus software is in place to protect the corporate network
試題解析與討論:
http://www.shc2b.com/st/2937613370.html試題參考答案:B
試題
6: When assessing the design of network monitoring controls, an IS auditor should FIRST review network:
A、topology diagrams.
B、bandwidth usage.
C、traffic analysis reports.
D、bottleneck locations.
試題解析與討論:
http://www.shc2b.com/st/2971413062.html試題參考答案:A
試題
7: Which of the following will help detect changes made by an intruder to the system log of a server?
A、Mirroring the system log on another server
B、Simultaneously duplicating the system log on a write-once disk
C、Write-protecting the directory containing the system log
D、Storing the backup of the system log offsite
試題解析與討論:
http://www.shc2b.com/st/298335068.html試題參考答案:B
試題
8: IT治理的最終目的是: ()
A、鼓勵(lì)最優(yōu)地運(yùn)用計(jì)算機(jī).
B、降低IT成本.
C、在組織中分散IT資源.
D、集中控制IT.
試題解析與討論:
http://www.shc2b.com/st/2994718200.html試題參考答案:A
試題
9: 交易審計(jì)痕跡的主要目的是?: ()
A、減少使用存儲(chǔ)媒介.
B、為處理交易確定問(wèn)責(zé)制和責(zé)任制.
C、幫助系統(tǒng)審計(jì)師進(jìn)行細(xì)微審查.
D、為能力規(guī)劃提供有益的信息.
試題解析與討論:
http://www.shc2b.com/st/2995319324.html試題參考答案:B
試題
10: 下列哪項(xiàng)會(huì)使得無(wú)線局域網(wǎng)抵制非授權(quán)的訪問(wèn)變?nèi)酰海ǎ?br />A、MAC地址過(guò)濾
B、WPA協(xié)議
C、LEAP輕量級(jí)可擴(kuò)展認(rèn)證協(xié)議
D、SSID廣播
試題解析與討論:
http://www.shc2b.com/st/3003818729.html試題參考答案:D