信息系统安全 期末考试试卷

两个铁球同时着地教学设计
信息系统安全》课程期末考试试卷
考试试卷: A卷、B
考试形式:闭、 开卷,允许带___任何纸张__入场
考试日期:       ,考试时间:120分钟
诚信考试,沉着应考,杜绝违纪。
考生姓名:
学号:
所属院系:
_
评卷人
Instructions: each question has exactly one correct answer. Please fill in your answers in
the table below. GRADING IS BASED ON THE TABLE, not what you write on the
questions.
1
2
3
C
4
5
B
6
7
8
9
10
C
C
A
A
B
D
B
B
11
A
12
A
13
B
14
A
15
C
16
D
17
A
18
D
19
C
20
D
21
B
22
C
23
B
24
B
25
D
26
B
27
B
28
B
29
B
30
C
31
B
32
A
33
A
34
B
35
B
36
D
37
C
38
A
39
A
40
A
41
C
42
D
43
B
44
C
45
C
46
A
47
D
48
A
49
C
50
A

1. Buffer overflow attack works by exploiting which attack surface?
A. Network attack surface
B. Human attack surface
C. Software attack surface
D. All of the above
ANS: ________________
C
2. DoS attack by flooding ping command works by exploiting which attack surface?
A. Network attack surface
B. Human attack surface
C. Software attack surface
D. All of the above
ANS: ________________
A
3. Which of the following is NOT a symmetric encryption algorithm?
A. DES
B. Triple DES
C. SHA-1
D. AES
ANS: ________________
C
4. Which of the following is NOT a public-key cryptography algorithm?
A. MD5
B. RSA应力应变
C. Diffe-Hellman
D. Elliptic Curve Cryptography
ANS: ________________
A
5. In the following figure for biometric authentication, what is the effect of moving the
decision threshold more to the left side?

A. There will be more false positives, i.e., genuine users will be more likely to be identified
as imposters.
B. 计算机工程与设计There will be more false negatives, i.e., imposters will be more likely to be identified as
genuine users.
C. It has no effect on the false positive or false negative rates.
D. None of the 2014sci影响因子above
ANS: ________________
B
6. Which of the following is NOT one of the purposes of salt in the UNIX password file?
A. increase difficulty of offline dictionary attacks
B. improve performance of the authentication process at runtime
C. prevents duplicate passwords from being visible in the password file
D. makes it difficult to find out whether a person with passwords on two or more systems
has used the same password on all of them
ANS: ________________
B
7. Consider the graph of cascaded granting of access rights below, where Ann grants the
access right to Bob at time t = 10 and to Chris at time t = 20, and so on. If sometime later,
Chris revokes access rights from David, what will happen to the access rights granted by
David to Ellen, and access rights granted by David to Frank?

A. Access rights granted by David to Ellen should be revoked, and access rights granted by
David to Frank should stay valid
B. Access rights granted by David to Ellen should stay valid, and access rights granted by
David to Frank should be revoked
C. Both should be revoked
D. Both should stay valid
ANS: ________________
D
8. Scanning traffic is characteristic of which type of malware?
A. Trojans
B. Worms
C. Viruses
D. Spam
E. Clickjacking
ANS: ________________
B
9. Displaying a fake QQ or Alipay login screen to collect user login credentials and send
them to the attacker is a form of
A. DoS attack
B. Phishing attack
C. Worm
D.套期保值 Polymorphic virus
E. Metamorphic virus
ANS: ________________
B
10. What is a DNS amplification attack?
A. Launch a flooding attack against a DNS server, to render it unavailable to provide DNS
service to DNS clients.
B. Change the DNS server configuration and redirect traffic from correct to the wrong sites
in order to perform phishing attacks
C. Use a DNS server as the reflector intermediary to launch a flooding attack on some ot
her
target machines.
D. None of the above
ANS: ________________
C
11. Consider the three-way handshake protocol for TCP connection setup shown below. What
is the target of the TCP SYN spoofing attack?

A. Server
B. Client
C. Host at the spoofed source address
D. Random host on the internet
ANS: ________________
A
12. What is the target of the TCP SYN flood attack?
A. Server
B. Client
C. Host at the spoofed source address
D. Random host on 勃拉姆斯第一交响曲the internet
ANS: ________________
A
13. True or false: in TCP SYN spoofing attack, the attacker’s network must have higher
bandwidth than the victim’s network in order to carry out the attack successfully.
A. True
B. False
ANS: ________________
B
14. True or false: in TCP SYN flood attack, the attacker’s network must have higher

本文发布于:2024-09-21 17:52:05,感谢您对本站的认可!

本文链接:https://www.17tex.com/xueshu/97009.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:考试   设计   试卷   沉着   应考   教学   开卷
留言与评论(共有 0 条评论)
   
验证码:
Copyright ©2019-2024 Comsenz Inc.Powered by © 易纺专利技术学习网 豫ICP备2022007602号 豫公网安备41160202000603 站长QQ:729038198 关于我们 投诉建议