第
65題: 隨著數(shù)據(jù)庫(kù)所處的環(huán)境日益開(kāi)放,所面臨的安全威脅也日益增多,其中攻擊者假冒用戶身份獲取數(shù)據(jù)庫(kù)系統(tǒng)訪問(wèn)權(quán)限的威脅屬于( )。
A.旁路控制
B.隱蔽信道
C.口令破解
D.偽裝
答案解析與討論:
www.shundajiancai.com/st/5741115212.html第
66題: 多數(shù)數(shù)據(jù)庫(kù)系統(tǒng)有公開(kāi)的默認(rèn)賬號(hào)和默認(rèn)密碼,系統(tǒng)密碼有些就存儲(chǔ)在操作系統(tǒng)中的普通文本文件中,如: Oracle 數(shù)據(jù)庫(kù)的內(nèi)部密碼就存儲(chǔ)在( )文件中。
A.listener.ora
B.strXXX.cmd
C.key.ora
D.paswrD.cmd
答案解析與討論:
www.shundajiancai.com/st/5741226131.html第
67題: 數(shù)據(jù)庫(kù)系統(tǒng)是一個(gè)復(fù)雜性高的基礎(chǔ)性軟件,其安全機(jī)制主要有標(biāo)識(shí)與鑒別、訪問(wèn)控制、安全審計(jì)、數(shù)據(jù)加密、安全加固、安全管理等,其中( )可以實(shí)現(xiàn)安全角色配置、安全功能管理
A.訪問(wèn)控制
B.安全審計(jì)
C.安全加固
D.安全管理
答案解析與討論:
www.shundajiancai.com/st/5741314592.html第
69題: 以下不屬于網(wǎng)絡(luò)設(shè)備提供的 SNMP 訪問(wèn)控制措施的是( )。
A.SNMP權(quán)限分級(jí)機(jī)制
B.限制 SNMP 訪問(wèn)的IP 地址
C.SNMP 訪問(wèn)認(rèn)證
D.關(guān)閉 SNMP 訪問(wèn)
答案解析與討論:
www.shundajiancai.com/st/5741518043.html第
70題: 網(wǎng)絡(luò)設(shè)備的常見(jiàn)漏洞包括拒絕服務(wù)漏洞、旁路、代碼執(zhí)行、溢出、內(nèi)存破壞等。CVE-2000-0945漏洞顯示思科 Catalyst 3500 XL 交換機(jī)的Web 配置接口允許遠(yuǎn)程攻擊者不需要認(rèn)證就執(zhí)行命令,該漏洞屬于( )。
A.拒絕服務(wù)漏洞
B.旁路
C.代碼執(zhí)行
D.內(nèi)存破壞
答案解析與討論:
www.shundajiancai.com/st/5741620645.html第
71題: Perhaps the most obvious difference between private-key andpublic-key encryption is that the former assumes complete secrecyof all cryptographic keys, whereas the latter requires secrecy foronly the private key.Although this may seem like a minor distinction ,the ramifications are huge: in the private-key setting thecommunicating parties must somehow be able to share the (71) keywithout allowing any third party to learn it, whereas in the public-key setting the (72) key can be sent from one party to the other overa public channel without compromising security.For partiesshouting across a room or, more realistically , communicating overa public network like a phone line or the nternet, public-keyencryption is the only option.
Another important distinction is that private-key encryption schemesuse the (73) key for both encryption and decryption, whereas publickey encryption schemes use (74) keys for each operation.That is public-key encryption is inherently asymmetri C.This asymmetry in thepublic-key setting means that the roles of sender and receiver are notinterchangeable as they are in the private-key setting; a single key-pair allows communication in one direction only.(Bidirectionalcommunication can be achieved in a number of ways; the point is thata single invocation of a public-key encryption scheme forces adistinction between one user who acts as a receiver and other userswho act as senders.)ln addition, a single instance of a (75) encryptionscheme enables multiple senders to communicate privately with asingle receiver,in contrast to the private-key case where a secret keyshared between two parties enables private communication onlybetween those two parties.
(1) A.main
B.same
C.public
D.secret
(2) A.stream
B.different
C.public
D.secret
(3) A.different
B.same
C.public
D.private
(4) A.different
B.same
C.public
D.private
(5) A.private-key
B.public-key
C.stream
D.Hash
答案解析與討論:
www.shundajiancai.com/st/5741716708.html