Morning questions and answer analysis for information security engineers in the second half of 2022

1. Network information is not leaked to unauthorized users, entities or programs, and the attribute that can prevent unauthorized persons from obtaining information refers to network information security ( ).

A. Integrity B. Confidentiality C. Non-repudiation D. Privacy

2. The entire life cycle of a network information system includes five stages: network information system planning, network information system design, network information system integration and implementation, network information system operation and maintenance, and network information system abandonment. Network information security management focuses on the process, in which network information security risk assessment belongs to the ( ) stage.

A. Network information system planning B. Network information system design  

C. Integration and realization of network information system D. Operation and maintenance of network information system

3. In recent years, the national secret algorithm and standard system have received more and more attention, and the application based on the national secret algorithm has also developed rapidly. Among the following national secret algorithms, the one that belongs to the block cipher algorithm is ( ).

A.SM2    B.SM3   C.SM4    D.SM9

4. Domain name service is the foundation of network services, which mainly refers to activities such as operation and management of domain name root servers, operation and management of top-level domain names, domain name registration, and domain name resolution. The "Internet Domain Name Management Measures" stipulates that when a network and information security incident occurs in the domain name system, it should be reported to the telecommunications management agency within ( ).

A. 6 hours B. 12 hours C. 24 hours D. 3 days

5. The "Encryption Law of the People's Republic of China" has played a key role in comprehensively improving the level of legalization of encryption work. The Encryption Law stipulates that the state implements classified management of encryption. According to the "Encryption Law of the People's Republic of China", the correct classification of the following passwords is ( ).

A. Core cipher, common cipher and commercial cipher B. Symmetric cipher and asymmetric cipher

C. Block ciphers, sequence ciphers, and public key cryptography D. Hash functions, symmetric ciphers, and public key cryptography

6. The attack tree method originated from the fault tree analysis method, which can be used for penetration testing and research on defense mechanisms. The following statement about the attack tree method is wrong ( )

A. Be able to take expert brainstorming and integrate these ideas into the attack tree

B. Ability to conduct cost-benefit analysis or probability analysis

C. It cannot be used to model scenarios such as multiple attempt attacks, time dependence, and access control

D. Can be used to model recurring events

7. Generally, before the attacker exits the system after a successful attack, he will create some backdoors in the system to facilitate his next intrusion. In the following method of designing a backdoor, the wrong one is ( ).

A. Relax file permissions B. Install a sniffer C. Change the administrator password D. Establish a covert channel

8. From the perspective of destructiveness to information, network attacks can be divided into passive attacks and active attacks. The following are passive attacks ( ).

A. Denial of service B. Eavesdropping C. Forgery D. Man-in-the-middle attack

9. The purpose of port scanning is to find out the list of services available on the target system. According to different technologies used in scanning, port scanning can be divided into full connection scanning, semi-connection scanning, SYN scanning, FIN scanning, covert scanning, ACK scanning, NULL scanning and other types. Among them, in the three-way handshake connection process between the source host and the destination host, only the first two times are completed, and the scan that does not establish a complete connection belongs to ( )

A. FIN scan B. Semi-connected scan C. SYN scan D. Fully connected scan

10. The attack method of deceptively obtaining sensitive personal information by posing as a trusted party to provide online services is called ( ).

A. Phishing B. Denial of service C. Network eavesdropping D. Session hijacking

11. Denial of service attack means that the attacker uses the defect of the system to perform some malicious operations, so that legitimate system users cannot get the service or system resources they deserve in time. Common denial of service attacks include synchronous packet storm, UDP flood, spam, teardrop attack, Surf attack, distributed denial of service attack and other types. Among them, it is ( ) that can make computer system reorganization disorder by adding too many or unnecessary offset fields in IP data packets.

A. Synchronization packet storm B. UDP flood C. Spam D. Teardrop attack

12. In 1997, NIST released the activity of soliciting the AES algorithm, and decided to choose Rijndael as the AES algorithm. The key length supported by this algorithm does not include ( ).

A.128 bits B.192 bits C.256 bits D.512 bits

13. In order to enhance the security of the DES algorithm, NIST released the triple DES algorithm - TDEA in 1999. Let DES Ek() and DES Dk() represent the encryption and decryption process of the DES algorithm with k as the key respectively, and P and O represent the plaintext and ciphertext messages respectively, then the encryption process of the TDEA algorithm is correct ( ).

A. P → DES EK1 → DES EK2 → DES EK3 → O

B. P → DES DK1 → DES DK2 → DES DK3 → O

C. P → DES EK1 → DES DK2 → DES EK3 →O

D. P → DES DK1 → DES EK2 → DES DK3 → O

14. In the following statement about digital certificates, the wrong one is ( ).

A. The digital certificate is issued by RA

B. The digital certificate contains the signature algorithm identification of the holder

C. The validity of the digital certificate can be verified by verifying the signature of the holder

D. The digital certificate contains information about the owner of the public key

15. SSH is a security application protocol based on public keys, which can implement various network security services such as encryption, authentication, and integrity verification. SSH consists of ( )3 sub-protocols.

A. SSH transport layer protocol, SSH user authentication protocol and SSH connection protocol

B. SSH network layer protocol, SSH user authentication protocol and SSH connection protocol

C.SSH transport layer protocol, SSH key exchange protocol and SSH user authentication protocol

D.SSH network layer protocol, SSH key exchange protocol and SSH user authentication protocol

16. For the security problem of email, people use PGP (Pretty Good Privacy) to protect the security of email. The following statement about PGP is wrong ( ).

A.PGP key management uses RSA B.PGP integrity detection uses MD5

C.PGP digital signature adopts RSA D.PGP data encryption adopts DES

17. The PDRR information model improves the traditional single security defense idea of ​​only protection, emphasizing the four aspects of information security

 

71~75. Perhaps the most obvious difference between private-key andpublic-key encryption is that the former assumes complete secrecyof all cryptographic keys, whereas the latter requires secrecy foronly the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting thecommunicating parties must somehow be able to share the (71) keywithout allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other overa public channel without compromising security.For partiesshouting across a room or, more realistically , communicating overa public network like a phone line or the nternet, public-keyencryption is the only option.

Another important distinction is that private-key encryption schemesuse the (73) key for both encryption and decryption, whereas publickey encryption schemes use (74) keys for each operation.That is public-key encryption is inherently asymmetric.This asymmetry in thepublic-key setting means that the roles of sender and receiver are notinterchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectionalcommunication can be achieved in a number of ways; the point is thata single invocation of a public-key encryption scheme forces adistinction between one user who acts as a receiver and other userswho act as senders.)ln addition, a single instance of a (75) encryptionscheme enables multiple senders to communicate privately with asingle receiver,in contrast to the private-key case where a secret keyshared between two parties enables private communication onlybetween those two parties.

(71) A.main     B.same     C.public    D.secret

(72) A.stream   B.different   C.public    D.secret

(73) A.different  B.same     C.public    D.private

(74) A.different  B.same     C.public    D.private

(75) A.private-key  B.public-key   C.stream   D.Hash

Answers and analysis of the morning questions for information security engineers in the second half of 2022

1.B  Click this link to view the real test analysis video 2023 soft exam information security engineer--morning real test analysis video over the years (second edition)-Learning Video Tutorial-Tencent Classroom

analyze

2.A

Parse:

3.C

Parse:

4.C

Parse:

Page 17 of the second edition of the textbook: Article 41 of the "Internet Domain Name Management Measures" stipulates that when a network and information security incident occurs in the domain name system, it should be reported to the telecommunications management agency within 24 hours.

   

 

     

             

 

 

Guess you like

Origin blog.csdn.net/xiaornshuo/article/details/132422904