信息安全工程師當天每日一練試題地址:http://www.shc2b.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.shc2b.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/5/12)在線測試:http://www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2017/5/12
信息安全工程師每日一練試題內容(2017/5/12)
試題
1:
小李在某單位是負責信息安全風險管理方面工作的部門領導,主要負責對所在行業(yè)的新人進行基本業(yè)務素質培訓,一次培訓的時候,小李主要負責講解風險評估方法。請問小李的所述論點中錯誤的是哪項:()
A.風險評估方法包括:定性風險分析、定量風險分析以及半定量風險分析
B.定性風險分析需要憑借分析者的經驗和直覺或者業(yè)界的標準和慣例,因此具有隨意性
C.定量風險分析試圖在計算風險評估與成本效益分析期間收集的各個組成部分的具體數(shù)字值,因此更具客觀性
D.半定量風險分析技術主要指在風險分析過程中綜合使用定性和定量風險分析技術對風險要素的賦值方式,實現(xiàn)對風險各要素的度量數(shù)值化
試題解析與討論:
http://www.shc2b.com/st/257324963.html試題參考答案:B
試題
2:
許多安全管理工作在信息系統(tǒng)生存周期中的運行維護階段發(fā)生。以下哪一種行為通常是不是在這一階段中發(fā)生的?()
A、進行系統(tǒng)備份
B、管理加密密鑰
C、認可安全控制措施
D、升級安全軟件
試題解析與討論:
http://www.shc2b.com/st/2646421818.html試題參考答案:C
試題
3:
與RSA(rivest,shamir,adleman)算法相比,DSS(digital signature standard)不包括:()
A、數(shù)字簽名
B、鑒別機制
C、加密機制
D、數(shù)據(jù)完整性
試題解析與討論:
http://www.shc2b.com/st/265054009.html試題參考答案:C
試題
4:
專門負責數(shù)據(jù)庫管理和維護的計算機軟件系統(tǒng)稱為:()
A.SQLMS
B.INFERENCECONTROL
C.DBMS
D.TRIGGER-MS
試題解析與討論:
http://www.shc2b.com/st/2682814814.html試題參考答案:C
試題
5:
下面哪一項安全控制措施不是用來檢測未經授權的信息處理活動:()
A.設置網絡鏈接時限
B.記錄并分析系統(tǒng)錯誤日志
C.記錄并分析用戶和管理員操作日志
D.啟用時鐘同步
試題解析與討論:
http://www.shc2b.com/st/2691010394.html試題參考答案:A
試題
6: Information for detecting unauthorized input from a terminal would be BEST provided by the:
A、console log printout.
B、transaction journal.
C、automated suspense file listing.
D、user error report.
試題解析與討論:
http://www.shc2b.com/st/2951118522.html試題參考答案:B
試題
7: Which of the following is the MOST critical and contributes the greatest to the quality of data in a data warehouse?
A、Accuracy of the source data
B、Credibility of the data source
C、Accuracy of the extraction process
D、Accuracy of the data transformation
試題解析與討論:
http://www.shc2b.com/st/296368420.html試題參考答案:A
試題
8: Over the long term, which of the following has the greatest potential to improve the security incident response process?
A、A walkthrough review of incident response procedures
B、Postevent reviews by the incident response team
C、Ongoing security training for users
D、Documenting responses to an incident
試題解析與討論:
http://www.shc2b.com/st/2974923942.html試題參考答案:B
試題
9: A company has decided to implement an electronic signature scheme based on public key infrastructure. The user's private key will be stored on the computer's hard drive and protected by a password. The MOST significant risk of this approach is:
A、impersonation of a user by substitution of the user's public key with another person's public key.
B、forgery by using another user's private key to sign a message with an electronic signature.
C、use of the user's electronic signature by another person if the password is compromised.
D、forgery by substitution of another person's private key on the computer.
試題解析與討論:
http://www.shc2b.com/st/297944688.html試題參考答案:A
試題
10: 當組織實施VPN時最主要的安全風險?()
A、惡意代碼的傳播
B、VPN登錄的嗅騙
C、流量被竊聽重放
D、VPN網關的安全
試題解析與討論:
http://www.shc2b.com/st/3001326407.html試題參考答案:A