Joke Collection Website - Blessing messages - Some topics and answers of network security knowledge contest

Some topics and answers of network security knowledge contest

33. The correct way to deal with the back door in the computer field is _ _ _ _ _. (Problem solving skills:)

A, the reserved back door should be deleted in time

B, the system regularly antivirus

C, the system regularly upgrades the virus database.

D, none of the above statements are correct

Correct answer: b

Time to answer questions: 1 sec

34. Which of the following statements about broilers is true _ _ _ _ (Problem solving skills:)

A machine that launched an active attack

B, the hacker implanted the Trojan horse's machine, and the hacker controlled the broiler chicken to participate in the attack through the Trojan horse control terminal.

C. Users usually voluntarily become broilers.

D, broilers can't attack.

Correct answer: b

Time-consuming answer: 5 seconds

35, about the distributed denial of service attack is not correct _ _ _ _ _ (problem solving skills:)

A. Attackers generally send reasonable service requests.

B, attackers can use broilers to attack cooperatively.

C. The attacker attacks the target by sending a virus.

D. the attacker's attack methods include DOS and DDOS.

Correct answer: C.

Time to answer questions: 1 sec

36. The network server is flooded with a lot of information that needs to be replied, which consumes bandwidth and causes the network or system to stop normal service. What kind of attack does this belong to? _ _ _ _ _ (Problem-solving skills:)

A. denial of service

B, file sharing

C. Binding vulnerabilities

D, remote procedure call

Correct answer: a

Time-consuming answer: 2 seconds

37. How to prevent ferry attacks _ _ _ _ (Problem solving skills:)

First, install anti-virus software

B, install a firewall

C, it is strictly prohibited to cross the use of USB flash drives between two information systems.

D, encryption

Correct answer: C.

Time-consuming answer: 2 seconds

38. Which of the following is not a preventive measure for buffer overflow vulnerabilities _ _ _ _ (problem solving skills:)

A, when programmers write programs, develop the habit of safe programming.

B, real-time monitoring software operation

C, change the compiler settings

Increase memory capacity

Correct answer: D.

Time-consuming answer: 2 seconds

39. What do ferry attacks usually use to steal information _ _ _ _ _ (Problem solving skills:)

A, invade the internal network from the external network

B, using the back door of the system to steal data

C, using the mobile carrier as a "ferry"

D, using zero-day attacks

Correct answer: C.

Time-consuming answer: 2 seconds

40. About the zero-day attack, it is _ _ _ _ (problem solving skills:)

A. the zero-day attack is almost invincible

B, zero-day attacks are rare.

C, zero-day attacks can be used multiple times.

D the zero-day attack was sudden.

Correct answer: C.

Time to answer questions: 1 sec

4 1, hackers mainly use social engineering to _ _ _ _ _ (problem solving skills:)

A. make a TCP connection.

B. DDOS attacks.

C. carry out ARP attack.

D. get the password

Correct answer: D.

Time to answer questions: 1 sec

42. The main reason for hitting the database to obtain sensitive data is _ _ _ _ _ (problem solving skills:)

A, the database did not take security protection measures.

B. Users set the same user name and password on different websites.

C, database security protection measures are weak

D, interest-driven

Correct answer: b

Time-consuming answer: 2 seconds

43. The following _ _ _ _ are symptoms of QQ poisoning (problem solving skills:)

A, QQ is always disconnected, prompting remote login.

B.there is a spam advertisement log in B.QQ space.

C, automatically send spam messages to friends.

D, all of the above

Correct answer: D.

Time to answer questions: 1 sec

44. Which of the following is the expression form of phishing websites _ _ _ _ (problem solving skills:)

First, the anniversary of the company

Lucky audience

C. Redeem points

D, all of the above

Time to answer questions: 1 sec

45. The hot topic is _ _ _ _ _ _ (problem solving skills:)

A. wireless access point

B, wired communication protocol

C, encrypted communication protocol

D. decrypt the communication protocol.

Correct answer: a

Time-consuming answer: 2 seconds

46. The QR code stores _ _ _ _ _ information. (Problem solving skills:)

A. User accounts

B. Bank information

C. Website (the host station of the World Wide Web)

D, none of the above is correct

Correct answer: C.

Time-consuming answer: 4 seconds

47. When using Apple products, many users will take illegal measures if they want to get root permission, which is usually called _ _ _ _ _ (problem solving skills:).

First, the back door

B, open source

C. Free

D, prison break

Correct answer: D.

Time-consuming answer: 4 seconds

48. The following statement about spam is _ _ _ _ (problem solving skills:)

Users reduce the use of e-mail entirely because of the influence of spam.

B, reduce users' trust in email.

Mail service providers can block spam.

D, valuable information is submerged in a lot of junk information, which is easy to be deleted by mistake.

Correct answer: a

Time-consuming answer: 3 seconds

49, in order to prevent spam, Internet e-mail service providers should be in accordance with the technical standards formulated by the Ministry of Information Industry to build an Internet e-mail service system, e-mail server with _ _ _ _ anonymous forwarding function. (Problem solving skills:)

A. Use

B, open it

C, close

Correct answer: C.

Time to answer questions: 12 seconds

50. In network security, interruption means that the attacker destroys the resources of the network system, making it invalid or useless. This is for _ _ _ _ _. (Problem solving skills:)

Usability attack

B, confidentiality attacks

C, integrity attack

D, the authenticity of the attack

Time-consuming answer: 2 seconds

5 1. The most accurate description of the root cause of information security problems is _ _ _ _ _ (problem solving skills:)

1. The problem of information security is caused by the continuous development of information technology.

B, information security problems are caused by the pursuit of fame and fortune by hacker organizations and criminal groups.

C, information security problems are caused by negligence in the design and development of information systems.

D, the internal cause of information security problem is the complexity of information system, and the external cause is the threat and destruction of opponents.

Correct answer: D.

Time-consuming answer: 2 seconds

52. Risk assessment methods mainly include _ _ _ _ _. (Problem solving skills:)

First, qualitative

B, quantitative

C, qualitative and quantitative combination

D, all of the above

Correct answer: D.

Time-consuming answer: 7 seconds

53, information network security (risk) assessment method _ _ _ _ (problem solving skills:)

First, the combination of qualitative evaluation and quantitative evaluation

B. Qualitative evaluation

C, quantitative evaluation

D. Fixed-point assessment

Correct answer: a

Time to answer questions: 1 sec

54. The Orange Book defines four levels of security, from layer D (the lowest protection layer) to layer A (the verification protection layer). A system that belongs to Class D is unsafe, and the following operating systems that do not belong to Class C are _ _ _ _ _. (Problem solving skills:)

I. UNIX system

B.LINUX system

c、WINDOWS2000

D. Windows 98

Correct answer: D.

Time to answer questions: 1 sec

55. Why do you need cryptography _ _ _ _ (problem solving skills:)

A. confidential information

B, have fun

make a telephone call

D, send text messages

Correct answer: a

Time-consuming answer: 2 seconds

56. In the public key system, the public key is used for _ _ _ _ _ (problem solving skills:)

A. Decryption and signature

B, encryption and signature

C, decryption and authentication

D, encryption and authentication

Correct answer: D.

Answer time: 1 1 sec.

57. Suppose an encryption algorithm is used, and its encryption method is simple: add 5 to each letter, that is, encrypt A into F. The key of this algorithm is 5, so it belongs to _ _ _ _ _. (Problem solving skills:)

First, symmetric encryption technology

B, block cipher technology

C, public key encryption technology

D, one-way function cryptography technology

Correct answer: a

Time-consuming answer: 3 seconds

58. The following description of DES is correct _ _ _ _ _. (Problem solving skills:)

A: It was jointly proposed by IBM, Sun and other companies.

B, the algorithm is not public, and the key is public.

C, its structure completely follows the complex structure network.

D is the most widely used block cipher algorithm.

Correct answer: D.

Time to answer questions: 1 sec

59. The meaning of "public key cryptosystem" is _ _ _ _. (Problem solving skills:)

A. Make all keys public

B. The private key is public and the public key is confidential.

C. the public key is public and the private key is confidential.

The two keys are the same

Correct answer: C.

Time-consuming answer: 5 seconds

60.PGP encryption technology is email encryption software based on _ _ _ _ _ system. (Problem solving skills:)

A.RSA public key encryption

DES symmetric key

C, MD5 digital signature

D, MD5 encryption

Correct answer: a

Time-consuming answer: 3 seconds

6 1, the main theoretical basis of PKI is _ _ _ _. (Problem solving skills:)

A, symmetric cryptographic algorithm

B, public key cryptography algorithm

C, quantum cryptography

D, abstract algorithm

Correct answer: b

Time to answer questions: 1 sec

62. _ _ _ _ _ provides directory browsing service in CA system. (Problem solving skills:)

First, the security server

B.CA server

C. registRAtion agency ra

D.LDAP server

Correct answer: D.

Time-consuming answer: 2 seconds