專業信息安全工程師網站|培訓機構|服務商(2020信息安全工程師學習QQ群:327677606,客服QQ:270019001)

軟題庫 培訓課程
當前位置:信管網 >> 信息安全工程師 >> 每日一練 >> 文章內容
信息安全工程師每日一練試題(2020/6/11)
來源:信管網??2020年06月12日? 【信管網:信息安全工程師專業網站所有評論

信息安全工程師當天每日一練試題地址:www.ghtijz.icu/exam/ExamDay.aspx?t1=6

往期信息安全工程師每日一練試題匯總:www.ghtijz.icu/class/27/e6_1.html

信息安全工程師每日一練試題(2020/6/11)在線測試:www.ghtijz.icu/exam/ExamDay.aspx?t1=6&day=2020/6/11

點擊查看:更多信息安全工程師習題與指導

信息安全工程師每日一練試題內容(2020/6/11)

試題1: In what way is a common gateway interface (CGI) MOST often used on a web server? 
A、Consistent way for transferring data to the application program and back to the user 
B、Computer graphics imaging method for movies and TV 
C、Graphic user interface for web design 
D、Interface to access the private gateway domain 
試題解析與討論:www.ghtijz.icu/st/2939017838.html
試題參考答案:A

試題2: During the review of a web-based software development project, an IS auditor realizes that coding standards are not enforced and code reviews are rarely carried out. This will MOST likely increase the likelihood of a successful: 
A、buffer overflow. 
B、brute force attack. 
C、distributed denial-of-service attack. 
D、war dialing attack. 
試題解析與討論:www.ghtijz.icu/st/2920117383.html
試題參考答案:A

試題3: When evaluating the controls of an EDI application, an IS auditor should PRIMARILY be concerned with the risk of: 
A、excessive transaction turnaround time. 
B、application interface failure. 
C、improper transaction authorization. 
D、nonvalidated batch totals. 
試題解析與討論:www.ghtijz.icu/st/2950622030.html
試題參考答案:C

試題4: 以下關于公鑰基礎設施(PKI)的說法中,正確的是()
A. PKI可以解決公鑰可信性問題
B. PKI不能解決公鑰可信性問題
C. PKI只能有政府來建立
D.PKI不提供數字證書查詢服務
試題解析與討論:www.ghtijz.icu/st/3274120315.html
試題參考答案:A

試題5

以下哪一項不是IIS服務器支持的訪問控制過濾類型?()
A、網絡地址訪問控制
B、web服務器許可
C、NTFS許可
D、異常行為過濾

試題解析與討論:www.ghtijz.icu/st/2655029533.html
試題參考答案:D

試題6: An IS auditor has been assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST ? 
A、That an audit clause is present in all contracts 
B、That the SLA of each contract is substantiated by appropriate KPIs 
C、That the contractual warranties of the providers support the business needs of the organization 
D、That at contract termination, support is guaranteed by each outsourcer for new outsourcers 
試題解析與討論:www.ghtijz.icu/st/2975519032.html
試題參考答案:C

試題7

傳統密碼學的理論基礎是()
A、 數學
B、 物理學
C、 計算機學科
D、 力學

試題解析與討論:www.ghtijz.icu/st/2671626126.html
試題參考答案:A

試題8: Which of the following types of data validation editing checks is used to determine if a field contains data, and not zeros or blanks? 
A、Check digit 
B、Existence check 
C、Completeness check 
D、Reasonableness check 
試題解析與討論:www.ghtijz.icu/st/2976520772.html
試題參考答案:C

試題9

下列關于信息系統生命周期中實施階段所涉及主要安全需求描述錯誤的是:()
A.確保采購定制的設備、軟件和其他系統組件滿足已定義的安全要求
B.確保整個系統已按照領導要求進行了部署和配置
C.確保系統使用人員已具備使用系統安全功能和安全特性的能力
D.確保信息系統的使用已得到授權

試題解析與討論:www.ghtijz.icu/st/2753619114.html
試題參考答案:B

試題10: After reviewing its business processes, a large organization is deploying a new web application based on a VoIP technology. Which of the following is the MOST appropriate approach for implementing access control that will facilitate security management of the VoIP web application? 
A、Fine-grained access control 
B、Role-based access control (RBAC) 
C、Access control lists 
D、Network/service access control 
試題解析與討論:www.ghtijz.icu/st/293467653.html
試題參考答案:B



發表評論  查看完整評論  

相關內容

推薦文章
合作網站內容
2017赚钱0元开店项目 河北体彩11选五走势图一定 开奖结果查询 加拿大快乐8网址 飞鱼彩票有没有规律 排列三组选三的小技巧 后三组选包胆计划 福建十一选五 金融理财 广东11选5前三组选怎么买 精高策略配资 中原风采22选开奖今天 捕鱼达人3哪里下载 怎样判断股票涨跌 江苏十一选五走势图牛 集中盈配资 福彩湖北快3走势图