下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
第1题ThemainmethodsforsafeguardingtheintegrityofinformationdonotincludeAPasswordcheckingandmethods
BErrorcorrectioncodingmethodsCDigitalsignaturesDInstallationoffirewalls第2题ReliabilitydoesnotincludeADestructionresistance
B
Confidentiality
CEffectivenessDSurvival
第3题Informationsecurityguaranteesinclude:()
ATechnicalguaranteesBManagementguaranteesCPersonneltrainingguarantees
DLegalandregulatoryguarantees
正确答案:ABCD第4题Securitymeasuresforinformationsecurityassuranceinclude:()
AFirewalls
BAnti-virus
CVulnerabilityscanning
DIntrusiondetection
正确答案:ABCD第5题Theoperatingsystemsecuritymanagementobjectivesinclude
APreventionofunlawfuloperations
BDataprotection
CManagingusers
DSystemprotection
E
Ensuringsystemintegrity
正确答案:ABCDE第1题Isnetworkeavesdroppingapassive-aggressivebehavior?第2题Inordertodefendagainstnetworkeavesdropping,themostcommonlyusedmethodsare
A
Useofphysicaltransmission(non-networked)
BEncryptionofinformation
CWirelessnetworks
DTransmissionoverdedicatedlines
第3题TCPandUDPbelongto()protocols
ATransportlayerBDatalinklayer
CNetworklayer
DNoneoftheabove
第4题TCPprotocoldistinguishesbetweendifferentconnectionsby().
APortnumber
BPortnumberandIPaddress
CPortnumberandMACaddress
DIPaddressandMACaddress
第5题Topreventnetworkeavesdropping,themostusedmethodismessageencryption
Chaptertest第1题DESisthemostfamoussymmetriccipheralgorithm,whichbelongstothegroupingcipher,thenumberofbitsoftheplaintextgroupingis
A64B56C128D256第2题Encryptionhassymmetrickeyencryption,asymmetrickeyencryptiontwokindsofencryption,whichsymmetrickeyencryptionrepresentativealgorithmis:
AIDE
BDES
CPGP
DPKI
ERSA
第3题Themaindisadvantagesofsymmetrickeycryptosystemsare:()
A
Slowspeedofencryptionanddecryption
BKeydistributionandmanagementissues
CLimitationsofapplication
DTheencryptionkeyisdifferentfromthedecryptionkey.
第4题InRSApublickeyencryptionsystem,hewantstosendheramail,andletherknowthathesent,theencryptionsecretkeyshouldbechosenis().
AHispublickey
BHerpublickey
CHisprivatekey
DHerprivatekey
第5题IntermsoftherelationshipbetweenCAanddigitalcertificates,whichofthefollowingstatementsisincorrect
Adigitalcertificateistoensurethesecurityofcommunicationbetweenthetwosidesoftheelectronictrustrelationship,hewasissuedbytheCA
BDigitalcertificatesgenerallyrelyontheCAcenter'ssymmetrickeymechanismtorealizethe
C
Inelectronictransactions,digitalcertificatescanbeusedtoidentifytheparticipants.
DDigitalcertificatescanprovetheidentityofthecertificateholderinawaythatcannotbecounterfeited.
Chaptertest第1题WindowsNTandWindows2000systemscanbesettolocktheaccountafterseveralinvalidlogins,whichcanprevent()
ATrojanhorses.
BViolentattacks.
CIPspoofing.
D
Cacheoverflowattacks
第2题Which
levelofsecuritystandardsare,UnixandWindowsNT,theoperatingsysteminlinewith?
ALevelA
BLevel
BCLevel
CDLevel
D第3题Built-inuseraccountsinWindowsaredividedinto:
AAdministrator
BGuest
CServer
DLocal
正确答案:AB第4题LocalsecuritypolicyinWindowsincludes
AAccountstrategy
BLocalpolicy
CPublickeystrategy
DSoftwarerestrictionpolicies
正确答案:ABCD第5题WindowsDefenderSecurityCenterincludeswhichofthefollowingoptions?
AVirusandthreatprotection
B
Accountprotection
CFirewallsandnetworkprotection
DEquipmentperformanceandoperationalstatus
正确答案:DCBAChaptertest第1题
Trojanhorsevirusesare:
AMacroviruses
BIntroducedviruses
CWorms
DService/client-basedviruses
第2题Accordingtotheclassificationofinfectedobjects,CIHvirusbelongstowhichcategoryofviruses?
A
Lead-inzoneviruses
BFile-basedviruses
CMacroviruses
DCompositeviruses
第3题Computervirusesare()
AAnorder
BAprogram
CAmarker
DOnedocument
第4题Whatisamacrovirus?
AMacrovirusesinfectallfiles
B
Amacrovirusisasetofinstructions
CMacrovirusesinfectonlyMicrosoftOfficecomponents
DMacrovirusesrunautomaticallyanddonotneedtorunwiththedocument.
第5题Forfloppydisksthathavebeeninfectedwithviruses,themostthoroughwaytoremovevirusesisto().
ASterilizethediskettewithalcohol
BCookinapressurecooker
CRemovalofvirus-infectedprograms
DFormattingfloppydisks
Chaptertest第1题Althoughcookiesbringquickandconvenientaccesstowebpages,theymayleadtoinformationleakage.
第2题Tominimizetherisk,itisnotrecommendedtousetheInternetserviceis().
AWebservices
BExternalaccesstointernalsystems
CInternalaccesstotheInternet
DFTPservices
第3题OntheInternet,commonsecuritythreatsinclude.
ADenial-of-serviceattacks
BSharingofresources
CProliferationofARPattacks
DUnauthorizedresourcevisits
正确答案:ACD第4题Whatarethesecuritylevelsofthebrowser?
AHigh
BMedium
CMedium-low
DLow
正确答案:ABCD第5题Thebrowserisaccessedby?
AInternetBLocalInternet
CTrustedsites
DRestrictedsites
正确答案:ABCDChaptertest第1题Attacksthatfirewallscandefendagainstinclude:
AsinglepacketattacksBscanningattacks
Cfloodingattacks正确答案:ABC第2题Firewallisa()
ASeparators,limiters,analyzers
BIsolators,controllers,analyzers
CSeparator,controller,resolver
第3题Thecurrentfirewallpreventionismainly()
AProactiveprevention
BPassiveprevention
CNotnecessarily
第4题Firewalldeployment()
AThefirewallonlyneedstobesetupattheentranceandexitconnectedtotheInternet.
B
Firewallsaredeployedatallentrancesandexitsthatneedtoprotectthelocalareanetwork.CFirewalldeploymentneedstobedeployedbetweentheentranceandnetworksegments.
第5题Firewallpolicyisalsoknownasthesecurityrulesofthefirewall,whichisanimportantbasisforthefirewalltoimplementnetworkprotection.Chaptertest第1题Thefirststepinanintrusiondetectionsystemis:()
ASignalAnalysis
B
Informationgathering
CPacketfiltering
DPacketinspection
第2题IDSrulesincludenetworkmisuseand:()
ANetworkanomalies
B
Systemmisuse
CSystemanomalies
DOperationalanomalies
第3题IntrusionDetectionSystem(IDS)isareasonablecomplementto()tohelpthesystemagainstnetworkattacks.
ASwitches
BRouters
CServers
DFirewalls
第4题
IPS(IntrusionPreventionSystem)isabase()products,itisbasedon()attackidentificationmatching
AApplicationlayer,featurelibrary
BNetworklayer,protocols
CApplicationlayer,protocols
DNetworklayer,featurelibrary
第5题IDS,alsoknownasIntrusionDetectionSystem,isinstalledonthetrunkofthenetwork.
Chaptertest第1题Themethodsofportscanningmainlyinclude:()
AFullscan
BSemi-openscanning
CCovertscanningDVulnerabilityscanning
正确答案:ABCD第2题TypesofcomputerbackdoorTrojanhorsesinclude:()
ATrojanhorses
BRootKit
CScriptingbackdoors
DHiddenAccounts
正确答案:ABCD第3题TechnicalrealizationofIPspoofingandprecautionsagainstspoofingattacksinclude:()
AProductsusinganti-IPspoofingfunction
BCloselymonitoringthenetworkandalertingtoattacks
C
Useofup-to-datesystemsandsoftwaretoavoidguessingsessionserialnumbers
DStrictlysetroutingpolicy:rejectpacketsfromtheInternetthataredeclaredtooriginatefromalocaladdress
正确答案:ABCD第4题Preventivemeasuresagainstdenial-of-serviceattacksinclude:()
ASecurityenhancements
BResourcecontrol
CSafetyequipment
DOperators,publicsecuritydepartments,expertteams,etc.
正确答案:ABCD第5题Typicaldenial-of-serviceattacksinclude:()
APingofdeathBSYNFlood
CUDPFlood
DTeardrop
正确答案:ABCDChaptertest第1题VPNrefersto()
AVirtualprivatenetworks
BVirtualprotocolnetworks
CVirtualpacket-filteringnetworks
第2题TheencryptionmeansofVPNis().
AFirewallswithencryption
BRouterswithencryption
CEachhostwithintheVPNencryptsitsinformationaccordingly
DSeparateencryptiondevices
第3题WhattypeofVPNisestablishe
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 民航语言测试题及答案
- 理科化学就业方向
- 水电站考试题及答案
- 2026年网络安全网络安全服务SLA管理专员面试题集
- 2026年医药销售客户经理面试题及应对策略
- 企业内部培训手册更新指南
- 企业培训师队伍建设指南(标准版)
- 2025年保险业务流程与规范操作指南
- 企业档案管理信息化建设指南
- 医院进修培训制度
- 复方蒲公英注射液在银屑病中的应用研究
- 住培中医病例讨论-面瘫
- 设备安装施工方案范本
- 卫生院副院长先进事迹材料
- 复发性抑郁症个案查房课件
- 网络直播创业计划书
- 人类学概论(第四版)课件 第1、2章 人类学要义第一节何为人类学、人类学的理论发展过程
- 《功能性食品学》第七章-辅助改善记忆的功能性食品
- 幕墙工程竣工验收报告2-2
- 1、工程竣工决算财务审计服务项目投标技术方案
- 改进维持性血液透析患者贫血状况PDCA
评论
0/150
提交评论