2016年下半年信息安全工程师考试上午真题

0
收藏   分享
  • 卷面总分:75分
  • 试卷类型:真题考试
  • 测试费用:免费
  • 答案解析:是
  • 练习次数:184次
  • 作答时间:150分钟
试卷简介
2016年下半年信息安全工程师考试上午真题
试卷预览
1

(1)is the science of hiding information.Where as the goal of cryp to graphy is to make data unreadable by a third party.the goal of steganography is to hide the data from a third party.In this article,I will discuss what steganography is,what purposes it serves,and will provide an example using available software. There are a large number of steganographic(2)that most of us are familiar with(especially if you watch a lot of spymovies),ranging from invisible inkandmicrodotstosecretingahiddenmessageinthesecondletterofeachwordofalargebodyoftextandspreadspectrumradiocommunication.With computersandnetworks,there arem any other ways of hiding informations,suchas: Covertchannels(c,g,Lokiandsomedistributeddenial-of-servicetoolsusetheInternetControl(3)Protocol,orICMP,asthecommunicationchannelbetweenthe“badguy”andacompromicyedsystem) HiddentextwithinWebpages Hidingfilesin“plainsight”(c,g.whatbetterplaceto“hide”afilethanwithanimportantsoundingnameinthec:\winntsystem32directory) Nullciphers(c,g,usingthefirstletterofeachwordtoformahiddenmessageinanotherwiseinnocuoustext) steganographytoday,however,issignificantlymore(4)than the example about suggest,allowing ausertohidelargeamountsofinformationwithinimageandaudio.Theseformsofsteganographyoftenareusedinconjunctionwith cryptographysothe information is double protected;firstitisencryptedandthenhiddensothatanadvertisementfirst.find the information(an often difficult task inandofitself)and the decryptedit. The simple stapproachtohidingdatawithinanimagefileiscalled(5)signatureinsertion.In this method,we can take the binaryrepresentationofthehiddendataandthebitofeachbytewithinthecovertimage.If weareusing 24-bitcolor the amount and will be minimum and indiscriminate to the human eye.

  • A.Cryptography
  • B.Geography
  • C.Stenography
  • D.Steganography
  • A.methods
  • B.software
  • C.tools
  • D.services
  • A.Member
  • B.Management
5

AES结构由以下4个不同的模块组成,其中()是非线性模块

  • A.字节代换
  • B.行移位
  • C.列混淆
  • D.轮密钥加
5

包过滤技术防火墙在过滤数据包时,一般不关心()

  • A.数据包的源地址
  • B.数据包的协议类型
  • C.数据包的目的地址
  • D.数据包的内容
5

以下关于网络流量监控的叙述中,不正确的是()

  • A.流量检测中所检测的流量通常采集自主机节点、服务器、路由器接口和路径等
  • B.数据采集探针是专门用于获取网络链路流量的硬件设备
  • C.流量监控能够有效实现对敏感数据的过滤
  • D.网络流量监控分析的基础是协议行为解析技术
5

以下关于VPN的叙述中,正确的是()

  • A.VPN指的是用户通过公用网络建立的临时的、安全的连接
  • B.VPN指的是用户自己租用线路,和公共网络物理上完全隔离的、安全的线路
  • C.VPN不能做到信息认证和身份认证
  • D.VPN只能提供身份认证,不能提供数据加密的功能