信息安全工程师
信息安全试题(14)
信管考点分类:信息系统安全基础
试题来源:信息安全试题(14)

试题内容

计算机取证的合法原则是:()
A、计算机取证的目的是获取证据,因此首先必须确保证据获取再履行相关法律手续
B、计算机取证在任何时候都必须保证符合相关法律法规
C、计算机取证只能由执法机构才能执行,以确保其合法性
D、计算机取证必须获得执法机关的授权才可进行以确保合法性原则


查看答案
你可能感兴趣的试题
283
智能IDS包括()
A、基于网络的、基于协议的、基于应用的三类
B、基于网络的、基于系统的、基于应用的三类
C、基于网络的、基于系统的、基于信息的三类
答案解析与讨论:https://www.ruantiku.com/shiti/242659103.html


664
Neural networks are effective in detecting fraud because they can: 
A、discover new trends since they are inherently linear. 
B、solve problems where large and general sets of training data are not obtainable. 
C、attack problems that require consideration of a large number of input variables. 
D、make assumptions about the shape of any curve relating variables to the output. 
答案解析与讨论:https://www.ruantiku.com/shiti/298378587.html


473
Which of the following risks could result from inadequate software baselining? 
A、Scope creep 
B、Sign-off delays 
C、Software integrity violations 
D、Inadequate controls 
答案解析与讨论:https://www.ruantiku.com/shiti/2962828724.html


375
下列哪一项应被认为是网络管理系统实质性特征?()
A、绘制网络拓扑的图形化界面
B、与因特网互动解决问题的能力
C、可以连接服务人员得到建议以便解决疑难问题
D、输出将数据输出至电子表格的设备
答案解析与讨论:https://www.ruantiku.com/shiti/3023520359.html


131
Linux操作系统具有和Unix系统相近的使用和管理方式()
A、对
B、错
答案解析与讨论:https://www.ruantiku.com/shiti/2411329597.html


178
Disabling which of the following would make wireless local area networks more secure against unauthorized access? 
A、MAC (Media Access Control) address filtering 
B、WPA (Wi-Fi Protected Access Protocol) 
C、LEAP (Lightweight Extensible Authentication Protocol) 
D、SSID (service set identifier) broadcasting 
答案解析与讨论:https://www.ruantiku.com/shiti/293333017.html