ImageVerifierCode 换一换
格式:DOCX , 页数:131 ,大小:80.74KB ,
资源ID:16316597      下载积分:5 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bingdoc.com/d-16316597.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(最新版精选安全专业模拟考试复习题库588题含答案.docx)为本站会员(b****6)主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(发送邮件至service@bingdoc.com或直接QQ联系客服),我们立即给予删除!

最新版精选安全专业模拟考试复习题库588题含答案.docx

1、最新版精选安全专业模拟考试复习题库588题含答案2020年安全专业考试复习题库588题【含答案】一、选择题1按照国家和信息产业部的安全等级划分方法,定级对象的安全等级从低到高依次划分为:()。A、1到3级。B、1到4级。C、1到5级。D、1到6级。参考答案:C2While assessing the risk of a network, which step are you conducting when you determine whether thenetwork can differentiate itself from other networks?A. Considering th

2、e business concernsB. Analyzing, categorizing and prioritizing resourcesC. Evaluating the existing perimeter and internal securityD. Using the existing management and control architectureAnswer: C3What host-level information would you want to obtain so you can exploit defaults and patches?A. Servers

3、B. Routers and switchesC. DatabasesD. Firewall typesAnswer: A4Which tool, service or command will enable you to learn the entire address range used by an organizationor company?A. TracerouteB. NslookupC. Port scannerD. Ping scannerAnswer: D5Which type of attack uses a simple or complex program that

4、self-replicates and/or deposits a payload ona remote or local computer?A. Dictionary attackB. Hijacking attackC. Illicit server attackD. Virus attackAnswer: D6Which service, tool or command allows a remote or local user to learn the directories or files that areaccessible on the network?A. Tracerout

5、eB. Share scannerC. Port scannerD. Ping scannerAnswer: B7Which service, command or tool allows a remote user to interface with a system as if he were sitting atthe terminal?A. HostB. FingerC. SetRequestD. TelnetAnswer: D8Abjee is going to log on to his network. His network does not employ traffic pa

6、dding mechanisms. Whywill it be easy for someone to steal his password?A. Because his password could be more than two weeks oldB. Because of he predictability of the length of the login and password promptsC. Because the Cleartext user name and password are not encryptedD. Because there is no provis

7、ion for log analysis without traffic padding, thus no accountability whenpasswords are lostAnswer: B9What is a spoofing attack?A. A hacker pretends to be the superuser and spoofs a user into allowing him into the systemB. A hacker calls a user and pretends to be a system administrator in order to ge

8、t the users passwordC. A computer (or network) pretends to be a trusted host (or network)D. A hacker gains entrance to the building where the network resides and accesses the system bypretending to be an employeeAnswer: C10In a Linux system, how do you stop the POP3, IMAPD, and FTP services?A. By ch

9、anging the permissions on the configuration file that controls the service (/sbin/inetd), thenrecompiling /etc/inetd.configB. By commenting out the service using the # symbol in the text file /etc/inetd.conf, then restarting theinetd daemonC. By recompiling the system kernel, making sure you have di

10、sabled that serviceD. By commenting out the service using the $ symbol in the text file /etc/inetd.conf, then restarting theinetd daemon.Answer: B11Which of the following is the best way to secure CGI scripts?A. Configure the firewall to filter CGI at ports 80 and 443B. Disable anonymous HTTP logins

11、 when using CGIC. Ensure that the code checks all user inputD. Active Java on the primary web serverAnswer: B12审核管理应支持以下响应方式:()。A、提醒管理员逾期事件;B、提醒管理员逾期临近时间;C、禁用逾期用户;D、停用逾期密码并强迫用户修改密码。参考答案:ABCD13Kerstin wants to improve the security on her FTP server. She is worried about password-sniffing attacks.Whic

12、h of the following is the best action for her to take?A. Disable anonymous loginsB. Allow only anonymous loginsC. Configure the firewall to block port 21D. Place the FTP server outside of the firewallAnswer: B14公司网络的终端设备允许通过方式以下方式接入:()A、802.1X认证B、安全网关认证C、MAC地址绑定参考答案:ABC15风险评估的内容包括:()A、识别网络和信息系统等信息资产

13、的价值。B、发现信息资产在技术、管理等方面存在的脆弱性、威胁。C、评估威胁发生概率、安全事件影响,计算安全风险。D、有针对性的提出改进措施、技术方案和管理要求。参考答案:ABCD16安全事件监控信息主要来自以下方面:()。A、网络安全设备或网络安全监控系统监测到的安全告警信息。B、政府相关部门或上级主管单位、有限公司通报的安全事件信息。C、安全事件投诉。参考答案:ABC17在确定安全域划分的原则后,需要对支撑的网络架构进行规划,分为()。A、接入层B、接口汇聚层C、核心交换层D、子系统层参考答案:BCD18安全域划分的根本原则包括:()。A、业务保障原则B、结构简化原则C、等级保护原则D、生命

14、周期原则参考答案:ABCD19网管系统的边界主要分类描述正确的是:()。A、与CMNet的接口风险最低B、支撑系统间接口风险最高C、集团-省公司、网元接口风险较低参考答案:C20对于程序运行或者程序自身由于管理需要访问其它系统所使用的专用帐号,应符合如下要求:()。A、只允许系统和设备之间通信使用,不得作为用户登录帐号使用。B、将此类帐号的维护管理权限统一授权给该系统的系统管理员,由后者归口管理。C、该系统的管理员负责建立该类帐号列表,并进行变更维护。参考答案:ABC21因系统能力或者管理原因无法按用户创建帐号时,应采取如下管理措施:()。A、明确共享帐号责任人,责任人负责按照上述流程要求提出

15、共享帐号审批表,并在审批表中注明该共享帐号的所有用户名单。B、限制共享帐号的使用人数,建立相关管理制度保证系统的每项操作均可以对应到执行操作的具体人员。C、限定使用范围和使用环境。D、建立完善的操作记录制度,对交接班记录、重要操作记录表等。E、定期更新共享帐号密码。参考答案:ABCDE22设备日志应支持记录用户对设备的操作,记录需要包括()。A、用户账号、操作时间、操作内容以及操作结果。B、操作系统、操作时间、操作内容以及操作结果。C、操作次数、操作时间、操作内容以及操作结果。D、登陆次数、操作时间、操作内容以及操作结果。参考答案:A2329.下列哪些操作可以看到自启动项目?A注册表B开始菜单

16、C任务管理器Dmsconfig参考答案:ABD24终端安全管理目标:规范支撑系统中终端用户的行为,降低来自支撑系统终端的安全威胁,重点解决以下问题()。A、终端接入和配置管理;终端账号、秘密、漏洞补丁等系统安全管理;桌面及主机设置管理;终端防病毒管理B、终端账号、秘密、漏洞补丁等系统安全管理;桌面及主机设置管理;终端防病毒管理C、终端接入和配置管理;桌面及主机设置管理;终端防病毒管理D、终端接入和配置管理;终端账号、秘密、漏洞补丁等系统安全管理;桌面及主机设置管理参考答案:A25What is the different between digital signature mechanisms

17、 and simple encryption?A. Digital signatures are generally 128-bit encryption, whereas simple encryption is generally 56 bitsB. Digital signatures are verified by third parties that vouch for the veracity of the sender and thecontentsC. Digital signatures carry timestamps, whereas standard encryptio

18、n does notD. Standard encryption mechanisms have no provision for traffic padding to thwart password sniffersAnswer: B266、在对Window系统进行安全配置时,下面可以采用的安全措施是:A、禁止用户帐号自动登录B、帐号登录时,应该启用ctrl+del+alt登录方式C、设置帐号登录闲置时间,避免无人值守时,被恶意用户使用机器D、系统关机时要清除页面文件参考答案:ABCD27What is the standard method for securing individual

19、e-mail messages sent between a company and otherusers that do not use that e-mail server?A. Invoke encryption at the e-mail serverB. Invoke encryption on each clientC. Filter firewall port 42 on the company firewallD. Store all e-mail messages on a separate partitionAnswer: B28You have installed a p

20、roxy server that authenticates users. However, you find that one user has bypassedthe proxy server by entering the default gateway IP address. How can you solve this problem?A. Configure the default gateway to deny access to all systemsB. Confront the userC. Reconfigure the users machineD. Configure

21、 the default gateway to reject all requests to all systems except for the proxy serverAnswer: D29Which application is used to learn about an operating systems type and patch level?A. TracerouteB. NmapC. WhoisD. PingAnswer: B30Ulf is a systems administrator. He sees that an attacker from a remote loc

22、ation is sending invalid packets,trying to monopolize Ulfs connection so that a denial of service occurs. What characteristic of theactivity makes Ulf think this is a denial-of-service attack?A. Bandwidth consumptionB. Hijacking of internal user resourcesC. PollingD. Use of an illicit serverAnswer:

23、A31Which directory holds the Microsoft NT operating system on an NT 4.0 server (using defaultinstallation)?A. windowsB. winntC. winnt4.0D. program filesAnswer: B32Which of the following do hackers target because it usually communicates in Cleartext?A. RouterB. DNS serverC. FTP serverD. E-mail server

24、Answer: C33A hacker has just changed the information for a zone during a zone transfer. This attack caused falseinformation to be passed on to network hosts as if it were legitimate. Which type of server is the target insuch an attack?A. An e-mail serverB. A DNS serverC. A routerD. A FTP serverAnswe

25、r: B34What is the name of the risk assessment stage in which you bypass login accounts and passwords?A. PenetrationB. ControlC. ActivationD. DiscoveryAnswer: A35Which type of attack uses a database or databases to guess a password in order to gain access to acomputer system?A. Hijacking attackB. Vir

26、us attackC. Dictionary attackD. Man-in-the-middle attackAnswer: C36Which type of attack occurs when a hacker obtains passwords and other information from legitimatetransactions?A. Man-in-the-middle attackB. Denial-of-service attackC. Dictionary attackD. Illicit server attackAnswer: A37What is proble

27、matic about a new NTFS partition?A. The 38Which of the following layers of TCP/IP stacks is the most difficult to secure?A. PhysicalB. NetworkC. TransportD. ApplicationAnswer: D39Which ports are used by SNMP?A. UDP ports 161 and 162B. UDP ports 20 and 21C. TCP ports 161 and 162D. TCP ports 20 and 21

28、Answer: A40Luke must advise his users about which client to employ when accessing remote systems. Which of thefollowing is a connection-oriented protocol that can contain unencrypted password information fromTelnet sessions?A. TCPB. TTPC. HTTPD. UDPAnswer: A41Laura is a system administrator who want

29、s to block all NNTP traffic between her network and theInternet. How should she configure her firewall?A. Disable anonymous logins in the NNTP configuration managerB. Configure all routers to block broadcast packetsC. Configure the firewall to block port 119D. Configure the firewall to block port 25

30、Answer: C42You are using a packet sniffer to capture transmissions between two remote systems. However, you findthat you can only capture packets between your own system and another. What is the problem?A. You have configure your filter incorrectlyB. You are sniffing packets in a switch networkC. Tc

31、pdump captures packets only between your host and another hostD. Your system does not have its default gateway configuredAnswer: B43Which protocol is normally used to communicate errors or other conditions at the IP layer, but has alsobeen used to conduct denial-of-service attacks?A. TCPB. ICMPC. SNMPD. UDPAnswer: B44Which of the following is the correct order of events in

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2