单选题 (一共75题,共75分)

1.

所有资源只能由授权方或以授权的方式进行修改,即信息未经授权不能进行改变的特性是指信息的( )。

2.

在Windows操作系统下,要获取某个网络开放端口所对应的应用程序信息,可以使用命令( )。

3.

访问控制是对信息系统资源进行保护的重要措施,适当的访问控制能够阻止未经授权的用户有意或者无意地获取资源。计算机系统中,访问控制的任务不包括( )。

4.

2019年10月26日,十三届全国人大常委会第十四次会议表决通过了《中华人民共和国密码法》,该法律自( )起施行。

5.

lSymmetric-key cryptosystems use the ( 1) key for encryption and decryption of a message,though a message or group of messages may have a different key than others .A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as Well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret ( 2) between two communicating parties,when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.Whitfield Diffie and Martin Hellman, authors of the first paper on public-key cryptography. In a groundbreaking 1976paper,Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used — a public key and a private key.A public key system is so constructed that calculation of one key (the private key) is computationally infeasible ( 3) the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.In public-key cryptosystems, the ( 4) key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented ( 5) , another public-key system.In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J.Williamson and Clifford Cocks,respectively) .回答1处

6.

lSymmetric-key cryptosystems use the ( 1) key for encryption and decryption of a message,though a message or group of messages may have a different key than others .A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as Well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret ( 2) between two communicating parties,when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.Whitfield Diffie and Martin Hellman, authors of the first paper on public-key cryptography. In a groundbreaking 1976paper,Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used — a public key and a private key.A public key system is so constructed that calculation of one key (the private key) is computationally infeasible ( 3) the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.In public-key cryptosystems, the ( 4) key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented ( 5) , another public-key system.In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J.Williamson and Clifford Cocks,respectively) .回答2处

7.

lSymmetric-key cryptosystems use the ( 1) key for encryption and decryption of a message,though a message or group of messages may have a different key than others .A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as Well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret ( 2) between two communicating parties,when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.Whitfield Diffie and Martin Hellman, authors of the first paper on public-key cryptography. In a groundbreaking 1976paper,Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used — a public key and a private key.A public key system is so constructed that calculation of one key (the private key) is computationally infeasible ( 3) the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.In public-key cryptosystems, the ( 4) key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented ( 5) , another public-key system.In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J.Williamson and Clifford Cocks,respectively) .回答3处

8.

lSymmetric-key cryptosystems use the ( 1) key for encryption and decryption of a message,though a message or group of messages may have a different key than others .A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as Well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret ( 2) between two communicating parties,when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.Whitfield Diffie and Martin Hellman, authors of the first paper on public-key cryptography. In a groundbreaking 1976paper,Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used — a public key and a private key.A public key system is so constructed that calculation of one key (the private key) is computationally infeasible ( 3) the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.In public-key cryptosystems, the ( 4) key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented ( 5) , another public-key system.In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J.Williamson and Clifford Cocks,respectively) .回答4处

9.

lSymmetric-key cryptosystems use the ( 1) key for encryption and decryption of a message,though a message or group of messages may have a different key than others .A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each ciphertext exchanged as Well. The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret. The difficulty of securely establishing a secret ( 2) between two communicating parties,when a secure channel doesn’t already exist between them, also presents a chicken-and-egg problem which is a considerable practical obstacle for cryptography users in the real world.Whitfield Diffie and Martin Hellman, authors of the first paper on public-key cryptography. In a groundbreaking 1976paper,Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used — a public key and a private key.A public key system is so constructed that calculation of one key (the private key) is computationally infeasible ( 3) the other (the public key), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. The historian David Kahn described public-key cryptography as “the most revolutionary new concept in the field since poly-alphabetic substitution emerged in the Renaissance”.In public-key cryptosystems, the ( 4) key may be freely distributed, while its paired private key must remain secret. The public key is typically used for encryption, while the private or secret key is used for decryption. Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie-Hellman key exchange protocol.In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented ( 5) , another public-key system.In 1997, it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ, a British intelligence organization, and that, in the early 1970s,both the Diffie-Hellman and RSA algorithms had been previously developed (by Malcolm J.Williamson and Clifford Cocks,respectively) .回答5处

10.

根据自主可控的安全需求,基于国密算法的应用也得到了快速发展。我国国密标准中的杂凑算法是( ) 。

11.

信息安全产品通用评测标准ISO/IEC 15408-1999《信息技术、安全技术、信息技术安全性评估准则》(简称CC),该标准分为三个部分:第1部分“简介和一般模型”、第2部分“安全功能需求”和第3部分“安全保证要求”,其中( ) 属于第2部分的内容。

12.

l从网络安全的角度看,要求网络安全防护系统是一个多层安全系统,避免成为网络中的“单失效点”。该原则是( ) 。

13.

为确保关键信息基础设施供应链安全,维护国家安全,依据( ) ,2020年4月27日,国家互联网信息办公室等12个部门联合发布了《网络安全审查办法》,该办法自2020年6月1日实施,将重点评估采购网络产品和服务可能带来的国家安全风险。

14.

密码学根据研究内容可以分为密码编制学和密码分析学。研究密码编制的科学称为密码编制学,研究密码破译的科学称为密码分析学。密码分析学中,根据密码分析者可利用的数据资源,可将攻击密码的类型分为四类,其中适于攻击计算机文件系统和数据库系统的是( ) 。

15.

以下关于认证和加密的表述中,错误的是:( ) 。

16.

为了保护用户的隐私,需要了解用户所关注的隐私数据。当前,个人隐私信息分为一般属性、标识属性和敏感属性,以下属于敏感属性的是( ) 。

17.

一台连接在以太网内的计算机为了能和其它主机进行通信,需要有网卡支持。网卡接收数据帧的状态有:unicast、broadcast、multicast、promiscuous等,其中能接收所有类型数据帧的状态是( ) 。

18.

数字签名是对以数字形式存储的消息进行某种处理,产生一种类似于传统手书签名功效的信息处理过程,一个数字签名机制包括:施加签名和验证签名。其中SM2数字签名算法的设计是基于( ) 。

19.

由于Internet规模太大,常把它划分成许多小的自治系统,通常把自治系统内部的路由协议称为内部网关协议,自治系统之间的协议称为外部网关协议。以下属于外部网关协议的是( ) 。

20.

Sniffer可以捕获到达主机端口的网络报文。Sniffer分为软件和硬件两种,以下工具属于硬件的是( ) 。

21.

报文内容认证使接收方能够确认报文内容的真实性,产生认证码的方式不包括( ) 。

22.

VPN即虚拟专用网,是一种依靠ISP和其他NSP在公用网络中建立专用的、安全的数据通信通道的技术。以下关于虚拟专用网VPN的描述中,错误的是( ) 。

23.

雪崩效应指明文或密钥的少量变化会引起密文的很大变化。下列密码算法中不具有雪崩效应的是( ) 。

24.

移动终端设备常见的数据存储方式包括:①SharedPreferences;②文件存储;③SQLite数据库;④ContentProvider;⑤网络存储。Android系统支持的数据存储方式包括( ) 。

25.

数字水印技术通过在数字化的多媒体数据中嵌入隐蔽的水印标记,可以有效实现对数字多媒体数据的版权保护等功能。数字水印的解释攻击是以阻止版权所有者对所有权的断言为攻击目的。以下不能有效解决解释攻击的方案是( ) 。

26.

僵尸网络是指采用一种或多种传播手段,将大量主机感染bot程序,从而在控制者和被感染主机之间形成的一个可以一对多控制的网络。以下不属于僵尸网络传播过程常见方式的是( ) 。

27.

计算机取证分析工作中常用到包括密码破译、文件特征分析技术、数据恢复与残留数据分析、日志记录文件分析、相关性分析等技术,其中文件特征包括文件系统特征、文件操作特征、文件格式特征、代码或数据特征等。某单位网站被黑客非法入侵并上传了Webshell,作为安全运维人员应首先从( ) 入手。

28.

操作系统的安全机制是指在操作系统中利用某种技术、某些软件来实施一个或多个安全服务的过程。操作系统的安全机制不包括( ) 。

29.

恶意代码是指为达到恶意目的而专门设计的程序或代码,恶意代码的一般命名格式为:<恶意代码前缀>.<恶意代码名称>.<恶意代码后缀>,常见的恶意代码包括:系统病毒、网络蠕虫、特洛伊木马、宏病毒、后门程序、脚本病毒、捆绑机病毒等。以下属于脚本病毒前缀的是( ) 。

30.

蜜罐技术是一种主动防御技术,是入侵检测技术的一个重要发展方向。蜜罐有四种不同的配置方式:诱骗服务、弱化系统、强化系统和用户模式服务器,其中在特定IP服务端口进行侦听,并对其他应用程序的各种网络请求进行应答,这种应用程序属于( ) 。

31.

已知DES算法S盒如下,如果该S盒的输入001011,则其二讲制输出为( )。

中级信息安全工程师,历年真题,2020年11月(上午)《信息安全工程师》真题

32.

域名系统DNS的功能是把Internet中的主机域名解析为对应的IP地址,目前顶级域名(TLD)有国家顶级域名、国际顶级域名、通用顶级域名三大类。最早的顶级域名中,表示非赢利组织域名的是( ) 。

33.

SMTP是电子邮件传输协议,采用客户服务器的工作方式,在传输层使用TCP协议进行传输。SMTP发送协议中,传送报文文本的指令是( ) 。

34.

有线等效保密协议WEP是IEEE 802.11标准的一部分,其为了实现机密性采用的加密算法是( ) 。

35.

片内操作系统COS是智能卡芯片内的一个监控软件,一般由通信管理模块、安全管理模块、应用管理模块和文件管理模块四个部分组成。其中对接收命令进行可执行判断是属于( ) 。

36.

l在PKI中,X.509数字证书的内容不包括( )。

37.

lSM4算法是国家密码管理局于2012年3月21日发布的一种分组密码算法,在我国商用密码体系中,SM4主要用于数据加密。SM4算法的分组长度和密钥长度分别为( ) 。

38.

在PKI体系中,注册机构RA的功能不包括( ) 。

39.

下列关于数字签名说法中,正确的是( ) 。

40.

2001年11月26日,美国政府正式颁布AES为美国国家标准。AES算法的分组长度为128位,其可选的密钥长度不包括( ) 。

41.

以下关于BLP安全模型的表述中,错误的是( ) 。

42.

以下无线传感器网络(WSN)标准中,不属于工业标准的是( ) 。

43.

按照行为和功能特性,特洛伊木马可以分为远程控制型木马、信息窃取型木马和破坏型木马等。以下不属于远程控制型木马的是( ) 。

44.

l数据库恢复是在故障引起数据库瘫痪以及状态不一致以后,将数据库恢复到某个正确状态或一致状态。数据库恢复技术一般有四种策略:基于数据转储的恢复、基于日志的恢复、基于检测点的恢复、基于镜像数据库的恢复,其中数据库管理员定期地将整个数据库复制到磁带或另一个磁盘上保存起来,当数据库失效时,取最近一次的数据库备份来恢复数据的技术称为( ) 。

45.

FTP是一个交互会话的系统,在进行文件传输时,FTP的客户和服务器之间需要建立两个TCP连接,分别是( ) 。

46.

蠕虫是一类可以独立运行、并能将自身的一个包含了所有功能的版本传播到其它计算机上的程序。网络蠕虫可以分为:漏洞利用类蠕虫、口令破解类蠕虫、电子邮件类蠕虫、P2P类蠕虫等。以下不属于漏洞利用类蠕虫的是( ) 。

47.

防火墙的体系结构中,屏蔽子网体系结构主要由四个部分构成:周边网络、外部路由器、内部路由器和堡垒主机。其中被称为屏蔽子网体系结构第一道屏障的是( ) 。

48.

等级保护2.0对于应用和数据安全,特别增加了个人信息保护的要求。以下关于个人信息保护的描述中,错误的是( ) 。

49.

Snort是一款开源的网络入侵检测系统,能够执行实时流量分析和IP协议网络的数据包记录。以下不属于Snort主要配置模式的是( ) 。

50.

目前,计算机及网络系统中常用的身份认证技术有:用户名/密码方式、智能卡认证、动态口令、生物特征认证等。其中不属于生物特征的是( ) 。

51.

信息系统受到破坏后,会对社会秩序和公共利益造成特别严重损害,或者对国家安全造成严重损害,按照计算机信息系统安全等级保护相关要求,应定义为( ) 。

52.

Web服务器也称为网站服务器,可以向浏览器等Web客户端提供文档,也可以放置网站文件和数据文件。目前最主流的三个Web服务器是Apache、Nginx、IIS。Web服务器都会受到HTTP协议本身安全问题的困扰,这种类型的信息系统安全漏洞属于( ) 。

53.

《计算机信息系统安全保护等级划分准则》中规定了计算机系统安全保护能力的五个等级,其中要求计算机信息系统可信计算基满足访问监控器需求的是( ) 。

54.

在需要保护的信息资产中,( ) 是最重要的。

55.

重放攻击是指攻击者发送一个目的主机己接收过的包,来达到欺骗系统的目的。下列技术中,不能抵御重放攻击的是( ) 。

56.

为了应对日益严重的垃圾邮件问题,服务提供商设计和应用了各种垃圾邮件过滤机制,以下耗费计算资源最多的垃圾邮件过滤机制是( )。

57.

在信息系统安全设计中,保证“信息及时且可靠地被访问和使用”是为了达到保障信息系统( ) 的目标。

58.

数字水印技术是指在数字化的数据内容中嵌入不明显的记号,被嵌入的记号通常是不可见的或者不可察觉的,但是通过计算操作能够实现对该记号的提取和检测。数字水印不能实现( ) 。

59.

安全套接字层超文本传输协议HTTPS在HTTP的基础上加入了SSL协议,网站的安全协议是HTTPS时,该网站浏览时会进行( ) 处理。

60.

Wi-Fi无线网络加密方式中,安全性最好的是WPA-PSK/WPA2-PSK,其加密过程采用了TKIP和( ) 。

61.

涉及国家安全、国计民生、社会公共利益的商用密码产品与使用网络关键设备和网络安全专用产品的商用密码服务实行( ) 检测认证制度。

62.

从对信息的破坏性上看,网络攻击可以分为被动攻击和主动攻击,以下属于被动攻击的是( ) 。

63.

密码工作是党和国家的一项特殊重要工作,直接关系国家政治安全、经济安全、国防安全和信息安全。密码法的通过对全面提升密码工作法治化水平起到了关键性作用。密码法规定国家对密码实行分类管理,密码分类中不包含( ) 。

64.

工业控制系统是由各种自动化控制组件和实时数据采集、监测的过程控制组件共同构成,工业控制系统安全面临的主要威胁不包括( ) 。

65.

资产管理是信息安全管理的重要内容,而清楚地识别信息系统相关的资产,并编制资产清单是资产管理的重要步骤。以下关于资产清单的说法中,错误的是:( ) 。

66.

身份认证是证实客户的真实身份与其所声称的身份是否相符的验证过程。下列各种协议中,不属于身份认证协议的是( ) 。

67.

恶意代码是指为达到恶意目的而专门设计的程序或者代码。常见的恶意代码类型有:特洛伊木马、蠕虫、病毒、后门、Rootkit、僵尸程序、广告软件。以下恶意代码中,属于宏病毒的是( ) 。

68.

以下不属于网络安全控制技术的是( ) 。

69.

在安全评估过程中,采取( ) 手段,可以模拟黑客入侵过程,检测系统安全脆弱性。

70.

一个密码系统至少由明文、密文、加密算法、解密算法和密钥五个部分组成,而其安全性是由( ) 决定的。

71.

密码学的基本安全目标主要包括:保密性、完整性、可用性和不可抵赖性。其中确保信息仅被合法用户访问,而不被泄露给非授权的用户、实体或过程,或供其利用的特性是指( ) 。

72.

等级保护2.0强化了对外部人员的管理要求,包括外部人员的访问权限、保密协议的管理要求。以下表述中,错误的是:( ) 。

73.

根据加密和解密过程所采用密钥的特点可以将加密算法分为对称加密算法和非对称密码算法两类,以下属于对称加密算法的是( ) 。

74.

移位密码的加密对象为英文字母,移位密码采用对明文消息的每一个英文字母向前推移固定key位的方式实现加密。设key=6,则明文“SEC”对应的密文为( ) 。

75.

国家密码管理局发布的《无线局域网产品须使用的系列密码算法》,其中规定密钥协商算法应使用的是( ) 。