信息安全工程师当天每日一练试题地址:www.fzyzx.cn/exam/ExamDay.aspx?t1=6
往期信息安全工程师每日一练试题汇总:www.fzyzx.cn/class/27/e6_1.html
信息安全工程师每日一练试题(2025/12/5)在线测试:www.fzyzx.cn/exam/ExamDay.aspx?t1=6&day=2025/12/5
点击查看:更多信息安全工程师习题与指导
信息安全工程师每日一练试题内容(2025/12/5)
试题1
BLP机密性模型用于防止非授权信息的扩散,从而保证系统的安全。其中主体只能向下读,不能向上读的特性被称为( )。查看答案
试题参考答案:C
试题2
AES算法的特点不包含( )查看答案
试题参考答案:A
试题3
网络信息安全的基本功能包括( )查看答案
试题参考答案:D
试题4
以下( )工具主要用于数据库漏洞扫描。查看答案
试题参考答案:C
试题5
( )用于评估系统在不同压力下的性能状况,提供负载生成、虚拟用户创建、测试控制,测试分析等功能。查看答案
试题参考答案:A
试题6
在工业控制系统中,为确保资产安全,以下哪项措施是首要任务?查看答案
试题参考答案:B
试题7
关于问卷调查,描述错误的是( )查看答案
试题参考答案:B
试题8
在交换机面临的网络安全威胁中,( )攻击方式通过伪造大量虚假MAC地址来填满交换机的MAC地址表,导致交换机泛洪转发。查看答案
试题参考答案:B
试题9
网络信息系统的生命周期包括( )阶段。查看答案
试题参考答案:A
试题10
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment (1)(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other (2), the attacker inserts a large amount of (3)packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an (4)who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.
Legacy mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(5)the net work.
查看答案
试题参考答案:C、B、C、D、A
JRS直播订阅号
JRS直播视频号
JRS直播抖音号
温馨提示:因考试政策、内容不断变化与调整,JRS直播网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!
JRS直播致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。
JRS直播软考课程由JRS直播依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。
| 发表评论 查看完整评论 | |