免费智能真题库 > 历年试卷 > 信息安全工程师 > 2016年下半年 信息安全工程师 上午试卷 综合知识
  第71题      
  知识点:   ICMP   net
  章/节:   网络信息安全专业英语       

 
( 71) is the science of hiding information. Whereas .the goal of cryptography is tomake dataulueadable by a third party, the goal of steganography is to hide the data from athirdparty.In this rticle, I will discuss what steganography is; what purposes it seryes, and will provide an example using available software.
There is a large number of steganographic ( 72) that most of us are familiar with (especially if you watch a lot of spy movies !),ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a lage body of text and spreads spectrum radio communication. With computers and networks,there are many other ways of hiding information ,such as:
> Covert channels (e.g.,Loki and some distributed denial-of-service tools use the Internet Control ( 73) Protocol, or ICMP,as the communications channel between the "bad guy" and a compromised system)
> Hidden text within web pages
> Hiding files in "plain sight" (e.g.,what better place to "hide a file than with an important sounding name in the c:\winnt\system32 directory?)
> Null ciphers (e.g., using the first letter of each word to from a hidden message in and otherwise innocuous text)
Steganography today ,however,is significantly more (74 )than the examples above suggest, allowing a user to hide large amounts of infromation within image and audio files.these forms of steganography often are used in conjunction with cryprography so that the information is doubly protected ;first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself ) and then decrypt it.
The simplest approach to hiding data within an image flile is callde ( 75) significant bit insertion in this method we can take the binary representation of the hidden data and overwirit the bit of each byte within the cover image . if we are using 24-bit color the amount of change well be mininmal and indiscerible to the human eye.
 
 
  A.  Cryptography
 
  B.  Geography
 
  C.  Stenography
 
  D.  steganography
 
 
 

 
  第75题    2016年下半年  
   71%
( 71) is the science of hiding information. Whereas .the goal of cryptography is tomake dataulueadable by a third party,..
  第73题    2020年下半年  
   60%
Symmetric-key cryptosystems use the (71 ) key for encryption and decryption of a message,though a message or group of me..
  第71题    2017年上半年  
   72%
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends ..
   知识点讲解    
   · ICMP    · net
 
       ICMP
        ICMP与IP位于同一层,它被用来传送IP的控制信息,它主要用来提供有关通向目的地址的路径信息。ICMP的Redirect信息通知主机通向其他系统的更准确的路径,而Unreachable信息则指出路径有问题。另外,如果路径不可用了,则ICMP可以使TCP连接终止。PING是最常用的基于ICMP的服务。
 
       net
        在网络管理中,最为常用的就是net命令家族。常用的net命令有以下几个。
        .net view命令:显示由指定的计算机共享的域、计算机或资源的列表。
        .net share:用于管理共享资源,使网络用户可以使用某一服务器上的资源。
        .net use命令:用于将计算机与共享的资源相连接或断开,或者显示关于计算机连接的信息。
        .net start命令:用于启动服务,或显示已启动服务的列表。
        .net stop命令:用于停止正在运行的服务。
        .net user命令:可用来添加或修改计算机上的用户账户,或者显示用户账户的信息。
        .net config命令:显示正在运行的可配置服务,或显示和更改服务器服务或工作站服务的设置。
        .net send命令:用于将消息(可以是中文)发送到网络上的其他用户、计算机或者消息名称上。
        .net localgroup命令:用于添加、显示或修改本地组。
        .net accounts命令:可用来更新用户账户数据库、更改密码及所有账户的登录要求。
   题号导航      2016年下半年 信息安全工程师 上午试卷 综合知识   本试卷我的完整做题情况  
1 /
2 /
3 /
4 /
5 /
6 /
7 /
8 /
9 /
10 /
11 /
12 /
13 /
14 /
15 /
 
16 /
17 /
18 /
19 /
20 /
21 /
22 /
23 /
24 /
25 /
26 /
27 /
28 /
29 /
30 /
 
31 /
32 /
33 /
34 /
35 /
36 /
37 /
38 /
39 /
40 /
41 /
42 /
43 /
44 /
45 /
 
46 /
47 /
48 /
49 /
50 /
51 /
52 /
53 /
54 /
55 /
56 /
57 /
58 /
59 /
60 /
 
61 /
62 /
63 /
64 /
65 /
66 /
67 /
68 /
69 /
70 /
71 /
72 /
73 /
74 /
75 /
 
第71题    在手机中做本题