ImageVerifierCode 换一换
格式:DOCX , 页数:106 ,大小:81.01KB ,
资源ID:7605206      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/7605206.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(最新版精选安全专业模拟考试588题含答案.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

最新版精选安全专业模拟考试588题含答案.docx

1、最新版精选安全专业模拟考试588题含答案2020年安全专业考试复习题库588题【含答案】一、选择题1公司网络的终端设备允许通过方式以下方式接入:()A、802.1X认证B、安全网关认证C、MAC地址绑定参考答案:ABC28、针对Widows系统的安全保护,下列说法正确的是:A、禁止用户帐号安装打印驱动,可防止伪装成打印机驱动的木马B、禁止存储设备的自动播放,可以防止针对U盘的U盘病毒C、系统程序崩溃时会产生叫coredump的文件,这种文件中不包含重要系统信息D、破坏者可以利用系统蓝屏重启计算机,从而把恶意程序加载到系统中,所以应禁止蓝屏重启参考答案:ABD3Which of the foll

2、owing choices lists the ports that Microsoft internal networking uses that should beblocked from outside access?A. UDP 137 and 138, and TCP 139B. Ports 11, 112, and 79C. UDP 1028, 31337 and 6000D. Port 80, 134 and 31337Answer: A4In a Linux system, how do you stop the POP3, IMAPD, and FTP services?A.

3、 By changing the permissions on the configuration file that controls the service (/sbin/inetd), thenrecompiling /etc/inetd.configB. By commenting out the service using the # symbol in the text file /etc/inetd.conf, then restarting theinetd daemonC. By recompiling the system kernel, making sure you h

4、ave disabled that serviceD. By commenting out the service using the $ symbol in the text file /etc/inetd.conf, then restarting theinetd daemon.Answer: B5What are the security issues that arise in the use of the NFS (Network File System)?A. Synchronization of user and group IDs is poor, so it is easy

5、 to spoof trusted hosts and user names.B. The lack of logging in one place or on one machine, and the multiple logs this then requires, cancreate bottlenecksC. The possibility arises for Cleartext passwords to be sniffed on the network if it does not use SecureRPC.D. NFS uses a weak authentication s

6、cheme and transfers information in encrypted formAnswer: A6What do the discretionary ACL (access control list) and the system ACL in Windows NT have incommon?A. Both share properties for storing secure object identifiersB. Both can grant or deny permissions to parts of the systemC. Both are installe

7、d by default on the system in different sections of the client/server modelD. Both are responsible for creation of the master access control listAnswer: A7中国移动网络运行维护规程落实了哪些网络运维要求()A集中化B标准化C信息化参考答案:ABC8终端安全管理目标:规范支撑系统中终端用户的行为,降低来自支撑系统终端的安全威胁,重点解决以下问题()。A、终端接入和配置管理;终端账号、秘密、漏洞补丁等系统安全管理;桌面及主机设置管理;终端防病毒管

8、理B、终端账号、秘密、漏洞补丁等系统安全管理;桌面及主机设置管理;终端防病毒管理C、终端接入和配置管理;桌面及主机设置管理;终端防病毒管理D、终端接入和配置管理;终端账号、秘密、漏洞补丁等系统安全管理;桌面及主机设置管理参考答案:A9安全评测标准依据原信息产业部制定的电信网和互联网安全防护系列标准,应从以下方面检查系统安全防护能力。()。A、业务、网络、设备B、业务、网络、设备、物理环境C、业务、网络、设备、物理环境、管理D、业务、网络、设备、物理环境、管理、灾难备份与恢复参考答案:D10审核管理应支持以下响应方式:()。A、提醒管理员逾期事件;B、提醒管理员逾期临近时间;C、禁用逾期用户;D

9、、停用逾期密码并强迫用户修改密码。参考答案:ABCD11Luke is documenting all of his network attributes. He wants to know the type of network-levelinformation that is represented by the locations of access panels, wiring closets and server rooms. Whichof the following is the correct term for this activity?A. Network mappingB

10、. IP service routingC. Router and switch designingD. War dialingAnswer: A12在编制定级报告时,应按以下层面描述各对象的重要性。()。A、对象社会影响力B、规模和服务范围C、所提供服务的重要性D、系统的等级参考答案:ABC13Kerstin connected to an e-commerce site and brought a new mouse pad with her credit card for $5.00plus shipping and handling. She never received her mo

11、use pad so she called her credit card company tocancel the transaction. She was not charged for the mouse pad, but she received multiple charges sheknew nothing about. She tried to connect to the site again but could not find it. Which type of hackingattack occurred?A. Denial-of-service attackB. Hij

12、acking attackC. Illicit server attackD. Spoofing attackAnswer: B14风险评估的内容包括:()A、识别网络和信息系统等信息资产的价值。B、发现信息资产在技术、管理等方面存在的脆弱性、威胁。C、评估威胁发生概率、安全事件影响,计算安全风险。D、有针对性的提出改进措施、技术方案和管理要求。参考答案:ABCD15安全事件监控信息主要来自以下方面:()。A、网络安全设备或网络安全监控系统监测到的安全告警信息。B、政府相关部门或上级主管单位、有限公司通报的安全事件信息。C、安全事件投诉。参考答案:ABC16设置安全域互访的原则为:()。A、高

13、保护等级访问低保护等级的安全域时只允许读,低保护等级访问高保护等级的安全域时只允许写。B、高保护等级访问低保护等级的安全域时只允许写,低保护等级访问高保护等级的安全域时只允许读。C、高保护等级访问低保护等级的安全域时不允许写,低保护等级访问高保护等级的安全域时不允许读。参考答案:B17针对网管系统对外的互联接口,其互联边界整合为:()。A、网管系统内部的互联边界:集团公司省公司地市连接的互联;B、与移动内部其他系统,如业务支撑系统、企业信息化系统等的互联;C、与第三方(集成商、设备商)的互联;D、与CMNET的互联(IP数据网管系统、EOMS与短信网关的连接)。参考答案:ABCD18业务支撑系

14、统核心域主要包括:()。A、互联网接口子域、外部接口子域、内部接口子域、终端接入子域。B、BOSS系统子域含客服子系统、经营分析系统子域、业务支撑网网管子域。C、核心生产区、日常办公区、接口区、内部系统互联网区、第三方接入区、DMZ区。参考答案:B19在确定安全域划分的原则后,需要对支撑的网络架构进行规划,分为()。A、接入层B、接口汇聚层C、核心交换层D、子系统层参考答案:BCD20按照业务纵向将支撑系统划分,可分为以下安全域:()。A、业务支撑系统安全域、网管系统安全域、企业信息化系统安全域。B、集团网管系统安全子域、省公司网管系统安全子域、地市分公司的网管系统安全子域。C、互联接口区、核

15、心生产区、日常维护管理区(维护终端)、第三方接入区(漫游区)、DMZ区。参考答案:B21网管系统的边界主要分类描述正确的是:()。A、与CMNet的接口风险最低B、支撑系统间接口风险最高C、集团-省公司、网元接口风险较低参考答案:C22每一个安全域总体上可以体现为以下的层面:()。A、接口层B、核心层C、系统层D、网络层参考答案:ABC23因系统能力或者管理原因无法按用户创建帐号时,应采取如下管理措施:()。A、明确共享帐号责任人,责任人负责按照上述流程要求提出共享帐号审批表,并在审批表中注明该共享帐号的所有用户名单。B、限制共享帐号的使用人数,建立相关管理制度保证系统的每项操作均可以对应到执

16、行操作的具体人员。C、限定使用范围和使用环境。D、建立完善的操作记录制度,对交接班记录、重要操作记录表等。E、定期更新共享帐号密码。参考答案:ABCDE24系统所有日志信息要求与帐号信息相关联,能够审计回溯到人,系统日志分为()。A、操作日志、系统日志B、操作日志、系统日志和异常日志C、系统日志和异常日志D、以上都不是参考答案:B25Which of the following will help control unauthorized access to an e-mail server?A. Disable CGI scriptsB. Prohibit relayingC. Limit

17、the number of e-mail messages a given account can receive in a dayD. Scan all e-mail messages at the firewall or SMTP serverAnswer: D26chmod-Are 777/home/ulf27Carol wants to choose a strong password for her computer. Which of the following should she include inher password?A. A mixture of uppercase

18、and lowercase letters, symbols and numbersB. An arcane phrase only she can rememberC. An incorrect spelling of a word or a phraseD. A mixture of random words that form non-senseAnswer: A28Why is the rlogin command dangerous to network security?A. Remote logins are a security threat regardless of the

19、 protocol and should be avoidedB. There is no way to prevent the user who successfully uses rlogin from becoming rootC. The rlogin command has a long history of buffer overflows that has not been correctedD. If one system that has extensive rlogin privileges to other systems is compromised, then a h

20、acker canspread throughout the entire networkAnswer: A29admin30What is problematic about a new NTFS partition?A. The 31What is the different between digital signature mechanisms and simple encryption?A. Digital signatures are generally 128-bit encryption, whereas simple encryption is generally 56 bi

21、tsB. Digital signatures are verified by third parties that vouch for the veracity of the sender and thecontentsC. Digital signatures carry timestamps, whereas standard encryption does notD. Standard encryption mechanisms have no provision for traffic padding to thwart password sniffersAnswer: B32Wha

22、t is the most common type of network attack?A. Denial-of-service attacks, because they are easy to perpetrateB. Insider attacks, because most resources are spent defending against outside attacksC. Packet sniffing and other 33Which ports are used by SNMP?A. UDP ports 161 and 162B. UDP ports 20 and 2

23、1C. TCP ports 161 and 162D. TCP ports 20 and 21Answer: A34What is the term for the process of replacing source IP addresses with false IP addresses?A. HijackingB. SpoofingC. SpammingD. Brute forceAnswer: B35What is the best way to keep employees on a LAN from unauthorized activity or other mischief?

24、A. Reduce each users permissions to the minimum needed to perform the tasks required by his or herjobB. Limit the number of logins available to all users to one at a timeC. Limit the number of files that any one user can have open at any given timeD. Implement a zero-tolerance policy in regard to em

25、ployees who load games or other unauthorizedsoftware on the companys computersAnswer: A36How might a hacker cause a denial-of-service attack on an FTP server?A. By executing a damaging program on the serverB. By initiating an ICMP floodC. By initiating a broadcast stormD. By filling the servers hard

26、 drive to capacityAnswer: D37设备日志应支持记录用户对设备的操作,记录需要包括()。A、用户账号、操作时间、操作内容以及操作结果。B、操作系统、操作时间、操作内容以及操作结果。C、操作次数、操作时间、操作内容以及操作结果。D、登陆次数、操作时间、操作内容以及操作结果。参考答案:A38Which protocol is normally used to communicate errors or other conditions at the IP layer, but has alsobeen used to conduct denial-of-service at

27、tacks?A. TCPB. ICMPC. SNMPD. UDPAnswer: B39Ulf wants to ensure that a hacker cannot access his DNS zone files. What is the best action for his to take?A. Filter TCP port 23B. Configure the firewall to block zone transfers and accept zone transfer requests only from specifichostsC. Configure all rout

28、ers to block zone transfers and encrypt zone transfer messagesD. Disable NslookupAnswer: B40Which system provides relay services between two devices?A. Proxy serverB. GatewayC. VPND. Screening routerAnswer: B41Which type of port is used by a client when it establishes a TCP connection?A. EphemeralB.

29、 Well-knownC. ReservedD. StaticAnswer: A42Kerstin wants to improve the security on her FTP server. She is worried about password-sniffing attacks.Which of the following is the best action for her to take?A. Disable anonymous loginsB. Allow only anonymous loginsC. Configure the firewall to block port

30、 21D. Place the FTP server outside of the firewallAnswer: B43Which of the following is a way to get around a firewall to intrude into a secure network from a remotelocation?1D0 - 470Leading the way in IT testing and certification tools, - 26 -A. IP servicesB. Active portsC. Identified network topolo

31、gyD. Modem banksAnswer: D44Lucy obtains the latest stable versions of server, services or applications. Which type of attack does thisaction help to prevent?A. Dictionary attackB. Buffer overflow attackC. Trojan attackD. Illicit server attackAnswer: B45Which service, command or tool discovers the IP addresses of all computers or routers between twocomputers on an internet/intranet

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1