ÐÅÏ¢°²È«¹ÜÀí»ù´¡ ÏÂÔر¾ÎÄ

25.IPSecÊÇÍøÂç²ãµäÐ͵İ²È«Ð­Ò飬Äܹ»ÎªIPÊý¾Ý°üÌṩ °²È«·þÎñ¡£ A.±£ÃÜÐÔ B.ÍêÕûÐÔ C.²»¿É·ñÈÏÐÔ D.¿ÉÉó¼ÆÐÔ E.ÕæʵÐÔ

26.ÐÅÏ¢°²È«²ßÂÔ±ØÐë¾ß±¸ ÊôÐÔ¡£ A.È·¶¨ÐÔ B.ÕýÈ·ÐÔ C.È«ÃæÐÔ D.ϸÖÂÐÔ E.ÓÐЧÐÔ

ËÄ¡¢ÎÊ´ðÌâ

1.ÐÅÏ¢°²È«¼¼Êõ»úÖÆͨ³£±»»®·ÖΪ¼¸¸ö²ã´Î¡£ÊÔÔÚÿ¸ö²ã´ÎÖÐÁоÙÁ½ÖÖÖ÷ÒªµÄ°²È«»úÖÆ¡£

2.¼òÊöBS 7799µÄÄÚÈݹ¹³ÉÒÔ¼°ÓëISO¹ú¼Ê±ê×¼µÄ¹Øϵ¡£

3.¼òÊöISO/IEC 17799¡Ã2005ÖйØÓÚ¿ØÖÆ´ëÊ©µÄ11Ïî·ÖÀàÄÚÈÝ¡£

4.¼òÊö°²È«²ßÂÔÌåϵËù°üº¬µÄÄÚÈÝ¡£

5.¼òÊöÖÁÉÙÁùÖÖ°²È«ÎÊÌâµÄ²ßÂÔ¡£

6.ÊÔ±àдһ¸ö¼òµ¥µÄ¿ÚÁî¹ÜÀí²ßÂÔ¡£

7.¼òÊö¿É½ÓÊÜʹÓòßÂÔAUPµÄÄÚÈÝ¡£

8.¼òÊöÈëÇÖ¼ì²âϵͳIDSËù²ÉÈ¡µÄÁ½ÖÖÖ÷Òª·½·¨¡£

9.¼òÊö·À»ðǽËù¾ßÓеľÖÏÞÐÔ¡£

10.¼òÊöÎïÀí°²È«µÄ¼¼Êõ²ãÃæµÄÖ÷ÒªÄÚÈÝ¡£

´ð°¸

Ò»¡¢ÅÐ ¶Ï Ìâ

1.¶Ô 2.¶Ô 3.¶Ô 4.¶Ô 5.¶Ô 6.¶Ô 7.¶Ô 8.´í 9.¶Ô 10.¶Ô 11.¶Ô 12.¶Ô

¶þ¡¢µ¥ Ñ¡ Ìâ

1.A 2.B 3.C 4.C 5.D 6.B 7.A 8.B 9.D 10.A 11.A 12.A 13.D 14.B 15.C 16.B 17.A 18.B 19.D 20.C 21.A 22.C 23.C 24.B 25.C 26.C 27.A 28.A 29.B 30.C 31.B 32.A 33.C 33.A 35.B 36.A 37.C 38.B 39.B 40.A 41.B 42.D 43.C 44.C 45.D 46.A 47.C 48.B 49.D 50.A 51.C 52.B 53.C 54.B 55.C 56.A 57.B 58.B 59.B 60.B

Èý¡¢¶à Ñ¡ Ìâ

1.AD 2.ABD 3.ABC 4.ACDE 5.ABD

6.BCDE 7.ABDE 8.AD 9.ABCD 10.ABCE 11.ABCDE 12.CDE 13.ABD 14.ABD 15.ABCDE 16.BDE 17.AC 18.ACDE 19.ABCE 20.ABCDE 21.BC 22.ABCDE 23.ABCDE 24.BC 25.ABE 26.ACE

ËÄ¡¢ÎÊ ´ð Ìâ

1.ÐÅÏ¢°²È«¼¼Êõ»úÖÆͨ³£±»»®·ÖΪ¼¸¸ö²ã´Î¡£ÊÔÔÚÿ¸ö²ã´ÎÖÐÁоÙÁ½ÖÖÖ÷ÒªµÄ°²È«»úÖÆ¡£

´ð£ºÐÅÏ¢°²È«¼¼Êõ»úÖÆͨ³£¿ÉÒÔ»®·ÖΪËĸö²ã´Î£¬Ã¿Ò»²ã´ÎÖеäÐ͵ݲȫ»úÖÆÈçÏÂËùʾ£º

£¨1£©ÎïÀí²ã°²È«£¬ÈçÊÓƵ¼à¿Ø¡¢ÃŽûϵͳ£» £¨2£©ÍøÂç²ã°²È«£¬Èç·À»ðǽ¡¢IPSecVPN£»

£¨4£©ÏµÍ³²ã°²È«£¬Èçɱ¶¾Èí¼þ£¬Ö÷»úÈëÇÖ¼ì²âϵͳ£» £¨5£©Ó¦Óò㰲ȫ£¬ÈçÓû§Éí·ÝÈÏÖ¤¡¢Ó¦Óòã¼ÓÃÜ¡£

2.¼òÊöBS 7799µÄÄÚÈݹ¹³ÉÒÔ¼°ÓëISO¹ú¼Ê±ê×¼µÄ¹Øϵ¡£

´ð£ºBS 7799·ÖÁ½¸ö²¿·Ö£¬µÚÒ»²¿·Ö£¬±»ISO¹ú¼Ê±ê×¼»¯×éÖ¯²ÉÄɳÉΪISO/IEC 17799¡Ã2005±ê×¼µÄ²¿·Ö£¬ÊÇÐÅÏ¢°²È«¹ÜÀíʵʩϸÔò£¨Code of Practice for Information Security Management£©£¬Ö÷Òª¹©¸ºÔðÐÅÏ¢°²È«ÏµÍ³¿ª·¢µÄÈËÔ±²Î¿¼Ê¹Óã¬ÆäÖ÷ÒªÄÚÈÝ·ÖΪ11¸ö·½Ã棬¶¨ÒåÁË133 Ïȫ¿ØÖÆ´ëÊ©£¨×î¼Ñʵ¼ù£©¡£µÚ¶þ²¿·Ö£¬±»ISO¹ú¼Ê±ê×¼»¯×éÖ¯²ÉÄɳÉΪISO/IEC 27001¡Ã2005£¬Êǽ¨Á¢ÐÅÏ¢°²È«¹ÜÀíÌåϵ£¨ISMS£©µÄÒ»Ì׹淶£¨Specification for Information Security Management Systems£©£¬ÆäÖÐÏêϸ˵Ã÷Á˽¨Á¢¡¢ÊµÊ©ºÍά»¤ÐÅÏ¢°²È«¹ÜÀíÌåϵµÄÒªÇ󣬿ÉÓÃÀ´Ö¸µ¼Ïà¹ØÈËÔ±Ó¦ÓÃISO/IEC 17799¡Ã2005£¬Æä×îÖÕÄ¿µÄÔÚÓÚ½¨Á¢ÊʺÏÆóÒµÐèÒªµÄÐÅÏ¢°²È«¹ÜÀíÌåϵ£¨ISMS£©¡£

3.¼òÊöISO/IEC 17799¡Ã2005ÖйØÓÚ¿ØÖÆ´ëÊ©µÄ11Ïî·ÖÀàÄÚÈÝ¡£

´ð£ºBS 7799-1ÐÅÏ¢°²È«¹ÜÀíʵʩϸÔò£¨ISO/IEC 17799¡Ã2005£©½«ÐÅÏ¢°²È«¹ÜÀíµÄÄÚÈÝ»®·ÖΪ11¸öÖ÷Òª·½Ã棬Õâ11 ¸ö·½Ãæ°üÀ¨£º £¨1£©°²È«²ßÂÔ£¨Security Policy£©£»

£¨2£©×éÖ¯ÐÅÏ¢°²È«£¨Organizing Information Security£©£» £¨3£©×ʲú¹ÜÀí£¨Asset Management£©£»

£¨4£©ÈËÁ¦×ÊÔ´°²È« £¨Human Resources Security£©£»

£¨5£©ÎïÀíÓë»·¾³°²È«£¨Physical and Environmental Security£©£» £¨6£©Í¨ÐÅÓë²Ù×÷¹ÜÀí£¨Communication and Operation Management£©£» £¨7£©·ÃÎÊ¿ØÖÆ£¨Access Control£©£»

£¨8£©ÐÅϢϵͳ»ñÈ¡¡¢¿ª·¢Óëά»¤£¨Information Systems Acquisition, Development and Maintenance£©£»

£¨9£©ÐÅÏ¢°²È«Ê¼þ¹ÜÀí£¨Information Security Incident Management£©£» £¨10£©ÒµÎñÁ¬ÐøÐÔ¹ÜÀí£¨Business Continuity Management£©£» £¨11£©·ûºÏÐÔ£¨Compliance£©¡£

4.¼òÊö°²È«²ßÂÔÌåϵËù°üº¬µÄÄÚÈÝ¡£

´ð£ºÒ»¸öºÏÀíµÄÐÅÏ¢°²È«²ßÂÔÌåϵ¿ÉÒÔ°üÀ¨Èý¸ö²»Í¬²ã´ÎµÄ²ßÂÔÎĵµ£º £¨1£© ×ÜÌ尲ȫ²ßÂÔ£¬²ûÊöÖ¸µ¼ÐÔµÄÕ½ÂÔ¸ÙÁìÐÔÎļþ£¬²ûÃ÷ÁËÆóÒµ¶ÔÓÚÐÅÏ¢°²È«µÄ¿´·¨ºÍÁ¢³¡¡¢ÐÅÏ¢°²È«µÄÄ¿±êºÍÕ½ÂÔ¡¢ÐÅÏ¢°²È«ËùÉæ¼°µÄ·¶Î§¡¢¹ÜÀí×éÖ¯¹¹¼ÜºÍÔðÈÎÈ϶¨ÒÔ¼°¶ÔÓÚÐÅÏ¢×ʲúµÄ¹ÜÀí°ì·¨µÈÄÚÈÝ£»

£¨2£©Õë¶ÔÌض¨ÎÊÌâµÄ¾ßÌå²ßÂÔ£¬²ûÊöÁËÆóÒµ¶ÔÓÚÌض¨°²È«ÎÊÌâµÄÉùÃ÷¡¢Á¢³¡¡¢ÊÊÓð취¡¢Ç¿ÖÆÒªÇó¡¢½ÇÉ«¡¢ÔðÈÎÈ϶¨µÈÄÚÈÝ£¬ÀýÈ磬Õë¶ÔInternet·ÃÎʲÙ×÷¡¢¼ÆËã»úºÍÍøÂ粡¶¾·ÀÖΡ¢¿ÚÁîµÄʹÓú͹ÜÀíµÈÌض¨ÎÊÌ⣬Öƶ¨ÓÐÕë¶ÔÐԵݲȫ²ßÂÔ£»

£¨3£©Õë¶ÔÌض¨ÏµÍ³µÄ¾ßÌå²ßÂÔ£¬¸üΪ¾ßÌåºÍϸ»¯£¬²ûÃ÷ÁËÌض¨ÏµÍ³ÓëÐÅÏ¢°²È«ÓйصÄʹÓúÍά»¤¹æÔòµÈÄÚÈÝ£¬Èç·À»ðǽÅäÖòßÂÔ¡¢µç×ÓÓʼþ°²È«²ßÂԵȡ£

5.¼òÊöÖÁÉÙÁùÖÖ°²È«ÎÊÌâµÄ²ßÂÔ¡£ ´ð£º£¨1£©ÎïÀí°²È«²ßÂÔ£»