1、精选计算机安全专业测试复习题库358题答案2020年计算机安全专业考试复习题库888题【含答案】一、选择题1安全域划分的根本原则包括:()。A、 业务保障原则B、结构简化原则C、等级保护原则D、生命周期原则参考答案:ABCD2日志信息包括:()。A、 安全日志B、 行为操作日志C、 事件日志D、 图形数据参考答案:ABCD328.哪些属于Windows操作系统的日志?。AAppEvent.EvtBSecEvent.EvtCSysEvent.EvtDW3C扩展日志参考答案:ABC4IP协议安全功能要求分为:()。A、 基本协议安全功能要求、路由协议安全功能要求、OSPF协议安全功能要求B、 基本
2、协议安全功能要求、路由协议安全功能要求、ISIS协议安全功能要求C、基本协议安全功能要求、路由协议安全功能要求、SNMP协议安全功能要求D、 基本协议安全功能要求、路由协议安全功能要求、BGP协议安全功能要求参考答案:C5认证功能用于确认登录系统的()。A、 用户真实身份B、 用户帐号权限C、 帐号口令是否正确参考答案:A6对于程序运行或者程序自身由于管理需要访问其它系统所使用的专用帐号,应符合如下要求:()。A、 只允许系统和设备之间通信使用,不得作为用户登录帐号使用。B、将此类帐号的维护管理权限统一授权给该系统的系统管理员,由后者归口管理。C、该系统的管理员负责建立该类帐号列表,并进行变更
3、维护。参考答案:ABC7当发生下述情况时,应立即撤销帐号或更改帐号口令,并做好记录:()。A、帐号使用者由于岗位职责变动、离职等原因,不再需要原有访问权限时。B、 临时性或阶段性使用的帐号,在工作结束后。C、帐号使用者违反了有关口令管理规定。D、有迹象表明口令可能已经泄露。参考答案:ABCD825.SQL SERVER的默认通讯端口有哪些?A、TCP 1025B、TCP 1433C、UDP 1434D、TCP 14333E、TCP 445参考答案:B9在集团公司和省公司,对信息化系统划分不同的安全域,安全域根据保护等级不同分为: ()A、 公共区B、 半安全区C、 安全区D、 核心安全区参考答
4、案:ABCD1023.下列哪个程序可以直接读出winlogon进程中缓存的密码A.findpassB.pwdumpC.JOHND.l0pht crack参考答案:A11按照业务纵向将支撑系统划分,可分为以下安全域:()。A、 业务支撑系统安全域、网管系统安全域、企业信息化系统安全域。B、 集团网管系统安全子域、省公司网管系统安全子域、地市分公司的网管系统安全子域。C、互联接口区、核心生产区、日常维护管理区(维护终端)、第三方接入区(漫游区)、DMZ区。参考答案:B12在确定安全域划分的原则后,需要对支撑的网络架构进行规划,分为()。A、 接入层B、 接口汇聚层C、 核心交换层D、 子系统层参考
5、答案:BCD13针对网管系统对外的互联接口,其互联边界整合为:()。A、网管系统内部的互联边界:集团公司省公司地市连接的互联;B、 与移动内部其他系统,如业务支撑系统、企业信息化系统等的互联;C、与第三方(集成商、设备商)的互联;D、与CMNET的互联(IP数据网管系统、EOMS与短信网关的连接)。参考答案:ABCD14安全域边界的保护原则是:()。A、 应以通为主,以隔为辅B、 应以隔为主,以通为辅C、 重点防护、重兵把守参考答案:A15安全审计方法包括:()。A、 抽样检查B、 系统检查C、 现场观察D、 访问、凭证检查参考答案:ABCD16策略管理至少包含()。A、认证策略、授权策略、访
6、问控制策略B、认证策略、授权策略、访问控制策略、应用控制策略C、认证策略、授权策略D、网络控制策略和应用控制策略参考答案:A17The concentric circle approach is used toA. Evaluate environmental threats.B. Assess the physical security facility,C. Assess the communications network security.D. Develop a personnel security program.Answer: B18网管系统的边界主要分类描述正确的是:()。A、
7、 与CMNet的接口风险最低B、 支撑系统间接口风险最高C、 集团-省公司、网元接口风险较低参考答案:C198MD5产生的散列值是多少位?A56 B64 C128 D160参考答案:C209、下面那些方法,可以实现对IIS重要文件的保护或隐藏?A、通过修改注册表,将缺省配置文件改名,并转移路径B、将wwwroot目录,更改到非系统分区C、修改日志文件的缺省位置D、将脚本文件和静态网页存放到不同目录,并分配不同权限参考答案:ABCD211、下面关于Windows DNS的说法,正确的是:A、支持TSIG技术,针对区带传输(ZONE Transfer)进行保护,利用密码学编码方式为通讯传输信息加密
8、B、不支持DNSSEC技术C、支持WINS查询功能D、支持动态更新,适用部署在DHCP的网络环境参考答案:BCD225、对于Windows DNS上集成的WINS功能,下面正确的说法是:A、WINS一般针对win98,win nt的系统B、WINS的动态更新,不支持认证机制C、应该尽量禁用DNS服务器上的WINS功能D、上面的说法均不正确参考答案:ABC236、相对于BIND,Windows DNS存在很多的不足,处在一个被取代的趋势,下面说法正确的是:A、在认证、加密、访问控制上存在缺陷B、windows代码不公开,不像BIND经过严格测试评估C、在软件开发上,BIND投入很大,对DNS这个
9、领域的发展有很大的影响D、BIND有很高的使用率参考答案:ABCD247、Windows DNS安全动态更新的方法,是其他DNS服务器所不具备,下面说法正确的是:A、安全动态更新是基于Windows AD服务,通过AD的权限控制来完成B、通过AD可以对DNS管理的区域等对象进行基于用户的权限分配C、在DHCP的网络环境里提供域名服务,此方法比较适用D、以上说法均不正确参考答案:ABC252一般的防火墙不能实现以下哪项功能?A隔离公司网络和不可信的网络 B防止病毒和特络依木马程序C隔离内网D访问控制参考答案:B2626.WINDOWS系统,下列哪个命令可以列举出本地所有运行中的服务A.net v
10、iewB.net useC.net startD.net statistics参考答案:C274从部署的位置看,入侵检测系统主要分为?A网络型、控制型 B主机型、混合型 C网络型、主机型 D主机型、诱捕型参考答案:C28审计日志根据萨班斯财务审计周期的要求,以下说法正确的是:()。A、 在线保存三个月,离线保存一年,并永久备份在磁带上。B、 在线保存六个月,离线保存一年。C、 在线保存三个月,离线保存一年。D、 在线保存六个月,离线保存两年,并永久备份在磁带上。参考答案:A2910UNIX中,可以使用下面哪一个代替Telnet,因为它能完成同样的事情并且更安全?AS-TELNET BSSH C
11、FTP DRLOGON参考答案:B3012FINGER服务使用哪个TCP端口?A69 B.119 C.79 D.70参考答案:C3114TCP/IP的三次握手过程是?ASYN/ACK,BSYN/ACK,CSYN,参考答案:D3215. SQL SERVER的默认DBA账号是什么?A、administratorB、saC、rootD、SYSTEM参考答案:B3318 职责分离的主要目的是?A 不允许任何一个人可以从头到尾整个控制某一交易或者活动;B 不同部门的雇员不可以在一起工作;C 对于所有的资源都必须有保护措施;D 对于所有的设备都必须有操作控制措施。参考答案:A3420Windows NT
12、中哪个文件夹存放SAM文件?A%Systemroot%B%Systemroot%system32samC%Systemroot%system32config D%Systemroot%config参考答案:C3522.风险评估包括以下哪些部分:A、资产评估B、脆弱性评估C、威胁评估参考答案:ABC363某种防火墙的缺点是没有办法从非常细微之处来分析数据包,但它的优点是非常快,这种防火墙是以下的哪一种?A电路级网关 B应用级网关 C会话层防火墙 D包过滤防火墙参考答案:D37What is the primary security risk in SNMP?A. Login names and
13、passwords are not encryptedB. Damaging programs can be executed on the clientC. Damaging programs can be executed on the serverD. Passwords and Data is transferred in CleartextAnswer: D38审核管理应支持以下响应方式:()。A、 提醒管理员逾期事件;B、 提醒管理员逾期临近时间;C、禁用逾期用户;D、停用逾期密码并强迫用户修改密码。参考答案:ABCD39While assessing the risk of a
14、network, which step are you conducting when you determine whether thenetwork can differentiate itself from other networks?A. Considering the business concernsB. Analyzing, categorizing and prioritizing resourcesC. Evaluating the existing perimeter and internal securityD. Using the existing managemen
15、t and control architectureAnswer: C40Kerstin wants to improve the security on her FTP server. She is worried about password-sniffing attacks.Which of the following is the best action for her to take?A. Disable anonymous loginsB. Allow only anonymous loginsC. Configure the firewall to block port 21D.
16、 Place the FTP server outside of the firewallAnswer: B41What is the primary security problem with FTP?A. Anonymous logins do not require a passwordB. Damaging programs can be executed on the clientC. Damaging programs can be executed on the serverD. The login name and password are sent to the server
17、 in cleartextAnswer: D42Which type of port is used by a client when it establishes a TCP connection?A. EphemeralB. Well-knownC. ReservedD. StaticAnswer: A43Which system provides relay services between two devices?A. Proxy serverB. GatewayC. VPND. Screening routerAnswer: B44What host-level informatio
18、n would you want to obtain so you can exploit defaults and patches?A. ServersB. Routers and switchesC. DatabasesD. Firewall typesAnswer: A45Which port is used by DNS when conducting zone transfers?A. UDP port 53B. UDP port 23C. TCP port 53D. TCP port 23Answer: C46Lucy obtains the latest stable versi
19、ons of server, services or applications. Which type of attack does thisaction help to prevent?A. Dictionary attackB. Buffer overflow attackC. Trojan attackD. Illicit server attackAnswer: B47Ulf wants to ensure that a hacker cannot access his DNS zone files. What is the best action for his to take?A.
20、 Filter TCP port 23B. Configure the firewall to block zone transfers and accept zone transfer requests only from specifichostsC. Configure all routers to block zone transfers and encrypt zone transfer messagesD. Disable NslookupAnswer: B48What is a Windows NT equivalent to a UNIX daemon?A. A threadB
21、. A processC. A protocolD. A serviceAnswer: D49Which of the following is the correct order of events in the termination of a TCP/IP connection?A. Active close, passive close, FIN, ACKB. Passive close, Active close, FIN, ACKC. Active close, passive close, ACK, FIND. Passive close, active close, ACK,
22、FINAnswer: A50What is the correct order of events in the establishment of a TCP/IP connection?A. Passive open, active open, ACKB. Passive open, ACK, active openC. Active open, active open, ACKD. Active open, passive open, ACKAnswer: D51You are using a packet sniffer to capture transmissions between
23、two remote systems. However, you findthat you can only capture packets between your own system and another. What is the problem?A. You have configure your filter incorrectlyB. You are sniffing packets in a switch networkC. Tcpdump captures packets only between your host and another hostD. Your syste
24、m does not have its default gateway configuredAnswer: B52How might a hacker cause a denial-of-service attack on an FTP server?A. By executing a damaging program on the serverB. By initiating an ICMP floodC. By initiating a broadcast stormD. By filling the servers hard drive to capacityAnswer: D53Whi
25、ch type if port is used by HTTP for the control connection?A. EphemeralB. Well-knownC. DynamicD. UDPAnswer: B54Which port does FTP use for a control connection?A. 21B. 25C. 53D. 162Answer: A55Kerstin connected to an e-commerce site and brought a new mouse pad with her credit card for $5.00plus shipp
26、ing and handling. She never received her mouse pad so she called her credit card company tocancel the transaction. She was not charged for the mouse pad, but she received multiple charges sheknew nothing about. She tried to connect to the site again but could not find it. Which type of hackingattack
27、 occurred?A. Denial-of-service attackB. Hijacking attackC. Illicit server attackD. Spoofing attackAnswer: B56You must apply permissions to a file named/home/myname/myfile.txt, and you need to fulfill thefollowing requirements:You want full access to the file.People in your group should be able to re
28、ad the file.People in your group should not be able to write the file.People outside of your group should be denied access to the file.What are the most secure permissions you would apply to the file?A. Chage 700/home/myname/myfile.txtB. Chage 744/home/myname/myfile.txtC. Chmod 640/home/myname/myfil
29、e.txtD. Chmod 064/home/myname/myfile.txtAnswer: A57Which level(s) of security as defined by the National Computer Security Center (NCSC) is attained bymany “out of the box” implementations of commercially available operating systems?A. Level B2B. Level DC. Level D through B2D. Level B through B2Answ
30、er: C58What are the security issues that arise in the use of the NFS (Network File System)?A. Synchronization of user and group IDs is poor, so it is easy to spoof trusted hosts and user names.B. The lack of logging in one place or on one machine, and the multiple logs this then requires, cancreate bottlenecksC. The possibility arises for Cleartext passwords to be sniffed on the n