信息安全工程師當天每日一練試題地址:http://www.shc2b.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.shc2b.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/6/1)在線測試:http://www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2017/6/1
信息安全工程師每日一練試題內(nèi)容(2017/6/1)
試題
1:
根據(jù)統(tǒng)計顯示,80%的網(wǎng)絡(luò)攻擊源于內(nèi)部網(wǎng)絡(luò),因此,必須加強對內(nèi)部網(wǎng)絡(luò)的安全控制和防范。下面的措施中,無助于提高同一局域網(wǎng)內(nèi)安全性的措施是( )。
A. 使用防病毒軟件
B. 使用日志審計系統(tǒng)
C. 使用入侵檢測系統(tǒng)
D. 使用防火墻防止內(nèi)部攻擊
試題解析與討論:
http://www.shc2b.com/st/7627.html試題參考答案:D
試題
2:
基于角色的訪問控制中,角色定義、角色成員的增減、角色分配都是由( )實施的,用戶只能被動接受授權(quán)規(guī)定,不能自主地決定,用戶也不能自主地將訪問權(quán)限傳給他人,這是一種非自主型訪問控制。
A.CSO
B.安全管理員
C.稽查員或?qū)徲媶T
D.應(yīng)用系統(tǒng)的管理員
試題解析與討論:
http://www.shc2b.com/st/23180.html試題參考答案:D
試題
3: 為了系統(tǒng)地、-完整地構(gòu)建信息系統(tǒng)的安全體系框架,信息系統(tǒng)安全體系應(yīng)當由()共同構(gòu)建。
A. .技術(shù)體系、組織機構(gòu)體系和管理體系
B.硬件、軟件、安全產(chǎn)品和管理制度
C.技術(shù)框架、產(chǎn)品、管理制度和標準
D.用戶需求、建設(shè)內(nèi)容、運維管理
試題解析與討論:
http://www.shc2b.com/st/1897118507.html試題參考答案:A
試題
4: 駐留在多個網(wǎng)絡(luò)設(shè)備上的程序在短時間內(nèi)同時產(chǎn)生大量的請求消息沖擊某 Web 服務(wù)器,導(dǎo)致該服務(wù)器不堪重負,無法正常響應(yīng)其他用戶的請求,這屬于() 。
A、網(wǎng)上沖浪
B、中間人攻擊
C、DDos 攻擊
D、MAC 攻擊
試題解析與討論:
http://www.shc2b.com/st/1900314092.html試題參考答案:C
試題
5: 我國的國家秘密分為幾級?()
A、3
B、4
C、5
D、6
試題解析與討論:
http://www.shc2b.com/st/2221425959.html試題參考答案:A
試題
6:
以下哪個拒絕服務(wù)攻擊方式不是流量型拒絕服務(wù)攻擊()
A.Land
B.UDP Flood
C.Smurf
D.teardrop
試題解析與討論:
http://www.shc2b.com/st/2570616337.html試題參考答案:D
試題
7:
規(guī)范的實施流程和文檔管理,是信息安全風(fēng)險評估能否取得成功的重要基礎(chǔ)。某單位在實施風(fēng)險評估時,形成了《待評估信息系統(tǒng)相關(guān)設(shè)備及資產(chǎn)清單》。在風(fēng)險評估實施的各個階段中,該《待評估信息系統(tǒng)相關(guān)設(shè)備及資產(chǎn)清單》應(yīng)是如下( )中的輸出結(jié)果。
A.風(fēng)險評估準備
B.風(fēng)險要素識別
C.風(fēng)險分析
D.風(fēng)險結(jié)果判定
試題解析與討論:
http://www.shc2b.com/st/2573912391.html試題參考答案:B
試題
8:
下面對能力成熟度模型解釋最準確的是:()
A、它認為組織的能力依賴于嚴格定義、管理完善、可測可控的有效業(yè)務(wù)過程
B、它通過嚴格考察工程成果來判斷工程能力
C、它與統(tǒng)計過程控制理論的出發(fā)點不同,所以應(yīng)用于不同領(lǐng)域
D、它是隨著信息安全的發(fā)展而誕生的重要概念
試題解析與討論:
http://www.shc2b.com/st/269961075.html試題參考答案:A
試題
9:
某系統(tǒng)被攻擊者入侵,初步懷疑為管理員存在弱口令,攻擊者從遠程終端以管理員身份登錄進行系統(tǒng)進行了相應(yīng)的破壞,驗證此事應(yīng)查看:()
A.系統(tǒng)日志
B.應(yīng)用程序日志
C.安全日志
D.IIS日志
試題解析與討論:
http://www.shc2b.com/st/270922165.html試題參考答案:C
試題
10:
在 Windows 2000中可以察看開放端口情況的是:()
A.nbtstat
B. net
C. net show
D.netstat
試題解析與討論:
http://www.shc2b.com/st/2720628945.html試題參考答案:D
試題
11: Which of the following should be a concern to an IS auditor reviewing a wireless network?
A、128-bit static-key WEP (Wired Equivalent Privacy) encryption is enabled.
B、SSID (Service Set IDentifier) broadcasting has been enabled.
C、Antivirus software has been installed in all wireless clients.
D、MAC (Media Access Control) access control filtering has been deployed.
試題解析與討論:
http://www.shc2b.com/st/293035464.html試題參考答案:B
試題
12: When reviewing an intrusion detection system (IDS), an IS auditor should be MOST concerned about which of the following?
A、Number of nonthreatening events identified as threatening
B、Attacks not being identified by the system
C、Reports/logs being produced by an automated tool
D、Legitimate traffic being blocked by the system
試題解析與討論:
http://www.shc2b.com/st/293581148.html試題參考答案:B
試題
13: In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should:
A、identify and assess the risk assessment process used by management.
B、identify information assets and the underlying systems.
C、disclose the threats and impacts to management.
D、identify and evaluate the existing controls.
試題解析與討論:
http://www.shc2b.com/st/2951027327.html試題參考答案:D
試題
14: Overall business risk for a particular threat can be expressed as:
A、a product of the probability and magnitude of the impact if a threat successfully exploits a vulnerability.
B、the magnitude of the impact should a threat source successfully exploit the vulnerability.
C、the likelihood of a given threat source exploiting a given vulnerability.
D、the collective judgment of the risk assessment team.
試題解析與討論:
http://www.shc2b.com/st/2956519321.html試題參考答案:A
試題
15: An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely:
A、check to ensure that the type of transaction is valid for the card type.
B、verify the format of the number entered then locate it on the database.
C、ensure that the transaction entered is within the cardholder's credit limit.
D、confirm that the card is not shown as lost or stolen on the master file.
試題解析與討論:
http://www.shc2b.com/st/2959318950.html試題參考答案:B
試題
16: When planning to add personnel to tasks imposing time constraints on the duration of a project, which of the following should be revalidated FIRST ?
A、The project budget
B、The critical path for the project
C、The length of the remaining tasks
D、The personnel assigned to other tasks
試題解析與討論:
http://www.shc2b.com/st/296956310.html試題參考答案:B
試題
17: Which of the following acts as a decoy to detect active Internet attacks?
A、Honeypots
B、Firewalls
C、Trapdoors
D、Traffic analysis
試題解析與討論:
http://www.shc2b.com/st/2970510908.html試題參考答案:A
試題
18: When reviewing a hardware maintenance program, an IS auditor should assess whether:
A、the schedule of all unplanned maintenance is maintained.
B、it is in line with historical trends.
C、it has been approved by the IS steering committee.
D、the program is validated against vendor specifications.
試題解析與討論:
http://www.shc2b.com/st/2984120081.html試題參考答案:D
試題
19: 信息系統(tǒng)審計師回顧組織的風(fēng)險估價流程時應(yīng)首先:()
A、鑒別對于信息資產(chǎn)威脅的合理性
B、分析技術(shù)和組織弱點
C、鑒別并對信息資產(chǎn)進行分級
D、對潛在的安全漏洞效果進行評價
試題解析與討論:
http://www.shc2b.com/st/3013524342.html試題參考答案:C
試題
20: 一個是審計師在檢查電信公司提供網(wǎng)際網(wǎng)路連線服務(wù),商場為他們的無線客戶。該公司使用的無線傳輸層安全性( WTLS的)和安全套接字層( SSL )技術(shù),保護其客戶的付款信息。該審計師最關(guān)心的是黑客:()
A.考慮無線應(yīng)用協(xié)議( WAP )網(wǎng)關(guān)安全。
B.在服務(wù)器前安裝流量監(jiān)控工具
C.偷盜客戶的PDA設(shè)備
D.監(jiān)聽無線數(shù)據(jù)傳輸
試題解析與討論:
http://www.shc2b.com/st/302027560.html試題參考答案:A