首页 CISP内容详情

信息安全工程师每日一练试题(2020/6/29)

2020-10-04 28 cisp

信息安全工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=6

往期信息安全工程师每日一练试题汇总:www.cnitpm.com/class/27/e6_1.html

信息安全工程师每日一练试题(2020/6/29)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=6&day=2020/6/29

点击查看:更多信息安全工程师习题与指导

信息安全工程师每日一练试题内容(2020/6/29)

试题 1: Before implementing controls, management should FIRST ensure that the controls: 
A、satisfy a requirement in addressing a risk issue. 
B、do not reduce productivity. 
C、are based on a cost-benefit analysis. 
D、are detective or corrective. 
试题解析与讨论:www.cnitpm.com/st/295484037.html
试题参考答案:

试题 2: With respect to the outsourcing of IT services, which of the following conditions should be of GREATEST concern to an IS auditor? 
A、Outsourced activities are core and provide a differentiated advantage to the organization. 
B、Periodic renegotiation is specified in the outsourcing contract. 
C、The outsourcing contract fails to cover every action required by the arrangement. 
D、Similar activities are outsourced to more than one vendor. 
试题解析与讨论:www.cnitpm.com/st/2968720860.html
试题参考答案:A

试题 3: When assessing the design of network monitoring controls, an IS auditor should FIRST review network: 
A、topology diagrams. 
B、bandwidth usage. 
C、traffic analysis reports. 
D、bottleneck locations. 
试题解析与讨论:www.cnitpm.com/st/2971413062.html
试题参考答案:A

试题 4: While reviewing the IT infrastructure, an IS auditor notices that storage resources are continuously being added. The IS auditor should: 
A、recommend the use of disk mirroring. 
B、review the adequacy of offsite storage. 
C、review the capacity management process. 
D、recommend the use of a compression algorithm. 
试题解析与讨论:www.cnitpm.com/st/2948015006.html
试题参考答案:C

试题 5

安全模型是用于精确和形式地描述信息系统的安全特征,解释系统安全相关行为。关于它的作用描述不正确的是?()
A.准确的描述安全的重要方面与系统行为的关系。
B.开发出一套安全性评估准则,和关键的描述变量。
C.提高对成功实现关键安全需求的理解层次。
D.强调了风险评估的重要性。

试题解析与讨论:www.cnitpm.com/st/2631826425.html
试题参考答案:D

试题 6

某网站在设计对经过了威胁建模和攻击面分析,在开发时要求程序员编写安全的代码,但是在部署时由于管理员将备份存放在WED 目录下导致了攻击者可直接下载备份,为了发现系统中是否存在其他类拟问题,一下那种测试方式是最佳的测试方法。()
A.模糊测试
B.源代码测试
C.渗透测试
D.软件功能测试

试题解析与讨论:www.cnitpm.com/st/257977906.html
试题参考答案:C

试题 7

我国信息安全事件分级分为以下哪些级别()
A.特别重大事件-重大事件-较大事件-一般事件
B.特别重大事件-重大事件-严重事件-较大事件-一般事件
C.特别严重事件-严重事件-重大事件-较大事件-一般事件
D.特别严重事件-严重事件-较大事件-一般事件

试题解析与讨论:www.cnitpm.com/st/261265895.html
试题参考答案:A

试题 8

关于信息安全保障的概念,下面说法错误的是:()
A.信息系统面临的风险和威胁是动态变化的,信息安全保障强调动态的安全理念
B.信息安全保障已从单纯的保护和防御阶段发展为集保护、检测和响应为一体的综合阶段
C.在全球互联互通的网络空间环境下,可单纯依靠技术措施来保障信息安全
D.信息安全保障把信息安全从技术扩展到管理,通过技术、管理和工程等措施的综合融合,形成对信息、信息系统及业务使命的保障

试题解析与讨论:www.cnitpm.com/st/2748321036.html
试题参考答案:C

试题 9: After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend? 
A、Stress 
B、Black box 
C、Interface 
D、System 
试题解析与讨论:www.cnitpm.com/st/2966318299.html
试题参考答案:D

试题 10: In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems? 
A、Maintaining system software parameters 
B、Ensuring periodic dumps of transaction logs 
C、Ensuring grandfather-father-son file backups 
D、Maintaining important data at an offsite location 
试题解析与讨论:www.cnitpm.com/st/292277740.html
试题参考答案:B