信息安全工程師當天每日一練試題地址:http://www.shc2b.com/exam/ExamDay.aspx?t1=6
往期信息安全工程師每日一練試題匯總:http://www.shc2b.com/class27-6-1.aspx
信息安全工程師每日一練試題(2017/6/8)在線測試:http://www.shc2b.com/exam/ExamDay.aspx?t1=6&day=2017/6/8
信息安全工程師每日一練試題內(nèi)容(2017/6/8)
試題
1:
數(shù)據(jù)安全的目的是實現(xiàn)數(shù)據(jù)的( )。
A、唯一性、不可替代性、機密性
B、機密性、完整性、不可否認性
C、完整性、確定性、約束性
D、不可否認性、備份、效率
試題解析與討論:
http://www.shc2b.com/st/785271.html試題參考答案:B
試題
2:
在信息系統(tǒng)安全建設(shè)中,( )確立全方位的防御體系,一般會告訴用戶應(yīng)有的責任,組織規(guī)定的網(wǎng)絡(luò)訪問、服務(wù)訪問、本地和遠地的用戶認證拔入和拔出、磁盤數(shù)據(jù)加密、病毒防護措施,以及雇員培訓等,并保證所有可能受到攻擊的地方必須以同樣安全級別加以保護
A、安全策略
B、防火墻
C、安全體系
D、系統(tǒng)安全
試題解析與討論:
http://www.shc2b.com/st/2114718345.html試題參考答案:A
試題
3:
當發(fā)生災(zāi)難時,以下哪一項能保證業(yè)務(wù)交易的有效性()
A.從當前區(qū)域外的地方持續(xù)每小時1次地傳送交易磁帶
B.從當前區(qū)域外的地方持續(xù)每天1次地傳送交易磁帶
C.抓取交易以整合存儲設(shè)備
D.從當前區(qū)域外的地方實時傳送交易磁帶
試題解析與討論:
http://www.shc2b.com/st/261793986.html試題參考答案:D
試題
4:
P2DR模型中的“反應(yīng)”是在檢測到安全漏洞和安全事件時,通過及時的響應(yīng)措施將網(wǎng)絡(luò)系統(tǒng)的安全性調(diào)整到風險最低的狀態(tài),這些措施包括?()
A.關(guān)閉服務(wù)。
B.向上級匯報。
C.跟蹤。
D.消除影響。
試題解析與討論:
http://www.shc2b.com/st/2632224103.html試題參考答案:B
試題
5:
下面哪類設(shè)備常用于識系統(tǒng)中存在的脆弱性?()
A.防火墻
B.IDS
C.漏洞掃描器
D.UTM
試題解析與討論:
http://www.shc2b.com/st/27154239.html試題參考答案:C
試題
6: To ensure compliance with a security policy requiring that passwords be a combination of letters and numbers, an IS auditor should recommend that:
A、the company policy be changed.
B、passwords are periodically changed.
C、an automated password management tool be used.
D、security awareness training is delivered.
試題解析與討論:
http://www.shc2b.com/st/291717152.html試題參考答案:C
試題
7: Business units are concerned about the performance of a newly implemented system. Which of the following should an IS auditor recommend?
A、Develop a baseline and monitor system usage.
B、Define alternate processing procedures.
C、Prepare the maintenance manual.
D、Implement the changes users have suggested.
試題解析與討論:
http://www.shc2b.com/st/293232327.html試題參考答案:A
試題
8: An IS auditor should be MOST concerned with what aspect of an authorized honeypot?
A、The data collected on attack methods
B、The information offered to outsiders on the honeypot
C、The risk that the honeypot could be used to launch further attacks on the organization's infrastructure
D、The risk that the honeypot would be subject to a distributed denial-of-service attack
試題解析與討論:
http://www.shc2b.com/st/2961012491.html試題參考答案:C
試題
9: An IS steering committee should:
A、include a mix of members from different departments and staff levels.
B、ensure that IS security policies and procedures have been executed properly.
C、have formal terms of reference and maintain minutes of its meetings.
D、be briefed about new trends and products at each meeting by a vendor.
試題解析與討論:
http://www.shc2b.com/st/298232696.html試題參考答案:C
試題
10: 評估商業(yè)連續(xù)計劃效果最好的方法是:()
A、使用適當?shù)臉藴蔬M行規(guī)劃和比較
B、之前的測試結(jié)果
C、緊急預案和員工培訓
D、環(huán)境控制和存儲站點
試題解析與討論:
http://www.shc2b.com/st/3010816510.html試題參考答案:B