Joke Collection Website - Blessing messages - Some topics and answers of network security knowledge contest
Some topics and answers of network security knowledge contest
A, the reserved back door should be deleted in time
B, the system regularly antivirus
C, the system regularly upgrades the virus database.
D, none of the above statements are correct
Correct answer: b
Time to answer questions: 1 sec
34. Which of the following statements about broilers is true _ _ _ _ (Problem solving skills:)
A machine that launched an active attack
B, the hacker implanted the Trojan horse's machine, and the hacker controlled the broiler chicken to participate in the attack through the Trojan horse control terminal.
C. Users usually voluntarily become broilers.
D, broilers can't attack.
Correct answer: b
Time-consuming answer: 5 seconds
35, about the distributed denial of service attack is not correct _ _ _ _ _ (problem solving skills:)
A. Attackers generally send reasonable service requests.
B, attackers can use broilers to attack cooperatively.
C. The attacker attacks the target by sending a virus.
D. the attacker's attack methods include DOS and DDOS.
Correct answer: C.
Time to answer questions: 1 sec
36. The network server is flooded with a lot of information that needs to be replied, which consumes bandwidth and causes the network or system to stop normal service. What kind of attack does this belong to? _ _ _ _ _ (Problem-solving skills:)
A. denial of service
B, file sharing
C. Binding vulnerabilities
D, remote procedure call
Correct answer: a
Time-consuming answer: 2 seconds
37. How to prevent ferry attacks _ _ _ _ (Problem solving skills:)
First, install anti-virus software
B, install a firewall
C, it is strictly prohibited to cross the use of USB flash drives between two information systems.
D, encryption
Correct answer: C.
Time-consuming answer: 2 seconds
38. Which of the following is not a preventive measure for buffer overflow vulnerabilities _ _ _ _ (problem solving skills:)
A, when programmers write programs, develop the habit of safe programming.
B, real-time monitoring software operation
C, change the compiler settings
Increase memory capacity
Correct answer: D.
Time-consuming answer: 2 seconds
39. What do ferry attacks usually use to steal information _ _ _ _ _ (Problem solving skills:)
A, invade the internal network from the external network
B, using the back door of the system to steal data
C, using the mobile carrier as a "ferry"
D, using zero-day attacks
Correct answer: C.
Time-consuming answer: 2 seconds
40. About the zero-day attack, it is _ _ _ _ (problem solving skills:)
A. the zero-day attack is almost invincible
B, zero-day attacks are rare.
C, zero-day attacks can be used multiple times.
D the zero-day attack was sudden.
Correct answer: C.
Time to answer questions: 1 sec
4 1, hackers mainly use social engineering to _ _ _ _ _ (problem solving skills:)
A. make a TCP connection.
B. DDOS attacks.
C. carry out ARP attack.
D. get the password
Correct answer: D.
Time to answer questions: 1 sec
42. The main reason for hitting the database to obtain sensitive data is _ _ _ _ _ (problem solving skills:)
A, the database did not take security protection measures.
B. Users set the same user name and password on different websites.
C, database security protection measures are weak
D, interest-driven
Correct answer: b
Time-consuming answer: 2 seconds
43. The following _ _ _ _ are symptoms of QQ poisoning (problem solving skills:)
A, QQ is always disconnected, prompting remote login.
B.there is a spam advertisement log in B.QQ space.
C, automatically send spam messages to friends.
D, all of the above
Correct answer: D.
Time to answer questions: 1 sec
44. Which of the following is the expression form of phishing websites _ _ _ _ (problem solving skills:)
First, the anniversary of the company
Lucky audience
C. Redeem points
D, all of the above
Time to answer questions: 1 sec
45. The hot topic is _ _ _ _ _ _ (problem solving skills:)
A. wireless access point
B, wired communication protocol
C, encrypted communication protocol
D. decrypt the communication protocol.
Correct answer: a
Time-consuming answer: 2 seconds
46. The QR code stores _ _ _ _ _ information. (Problem solving skills:)
A. User accounts
B. Bank information
C. Website (the host station of the World Wide Web)
D, none of the above is correct
Correct answer: C.
Time-consuming answer: 4 seconds
47. When using Apple products, many users will take illegal measures if they want to get root permission, which is usually called _ _ _ _ _ (problem solving skills:).
First, the back door
B, open source
C. Free
D, prison break
Correct answer: D.
Time-consuming answer: 4 seconds
48. The following statement about spam is _ _ _ _ (problem solving skills:)
Users reduce the use of e-mail entirely because of the influence of spam.
B, reduce users' trust in email.
Mail service providers can block spam.
D, valuable information is submerged in a lot of junk information, which is easy to be deleted by mistake.
Correct answer: a
Time-consuming answer: 3 seconds
49, in order to prevent spam, Internet e-mail service providers should be in accordance with the technical standards formulated by the Ministry of Information Industry to build an Internet e-mail service system, e-mail server with _ _ _ _ anonymous forwarding function. (Problem solving skills:)
A. Use
B, open it
C, close
Correct answer: C.
Time to answer questions: 12 seconds
50. In network security, interruption means that the attacker destroys the resources of the network system, making it invalid or useless. This is for _ _ _ _ _. (Problem solving skills:)
Usability attack
B, confidentiality attacks
C, integrity attack
D, the authenticity of the attack
Time-consuming answer: 2 seconds
5 1. The most accurate description of the root cause of information security problems is _ _ _ _ _ (problem solving skills:)
1. The problem of information security is caused by the continuous development of information technology.
B, information security problems are caused by the pursuit of fame and fortune by hacker organizations and criminal groups.
C, information security problems are caused by negligence in the design and development of information systems.
D, the internal cause of information security problem is the complexity of information system, and the external cause is the threat and destruction of opponents.
Correct answer: D.
Time-consuming answer: 2 seconds
52. Risk assessment methods mainly include _ _ _ _ _. (Problem solving skills:)
First, qualitative
B, quantitative
C, qualitative and quantitative combination
D, all of the above
Correct answer: D.
Time-consuming answer: 7 seconds
53, information network security (risk) assessment method _ _ _ _ (problem solving skills:)
First, the combination of qualitative evaluation and quantitative evaluation
B. Qualitative evaluation
C, quantitative evaluation
D. Fixed-point assessment
Correct answer: a
Time to answer questions: 1 sec
54. The Orange Book defines four levels of security, from layer D (the lowest protection layer) to layer A (the verification protection layer). A system that belongs to Class D is unsafe, and the following operating systems that do not belong to Class C are _ _ _ _ _. (Problem solving skills:)
I. UNIX system
B.LINUX system
c、WINDOWS2000
D. Windows 98
Correct answer: D.
Time to answer questions: 1 sec
55. Why do you need cryptography _ _ _ _ (problem solving skills:)
A. confidential information
B, have fun
make a telephone call
D, send text messages
Correct answer: a
Time-consuming answer: 2 seconds
56. In the public key system, the public key is used for _ _ _ _ _ (problem solving skills:)
A. Decryption and signature
B, encryption and signature
C, decryption and authentication
D, encryption and authentication
Correct answer: D.
Answer time: 1 1 sec.
57. Suppose an encryption algorithm is used, and its encryption method is simple: add 5 to each letter, that is, encrypt A into F. The key of this algorithm is 5, so it belongs to _ _ _ _ _. (Problem solving skills:)
First, symmetric encryption technology
B, block cipher technology
C, public key encryption technology
D, one-way function cryptography technology
Correct answer: a
Time-consuming answer: 3 seconds
58. The following description of DES is correct _ _ _ _ _. (Problem solving skills:)
A: It was jointly proposed by IBM, Sun and other companies.
B, the algorithm is not public, and the key is public.
C, its structure completely follows the complex structure network.
D is the most widely used block cipher algorithm.
Correct answer: D.
Time to answer questions: 1 sec
59. The meaning of "public key cryptosystem" is _ _ _ _. (Problem solving skills:)
A. Make all keys public
B. The private key is public and the public key is confidential.
C. the public key is public and the private key is confidential.
The two keys are the same
Correct answer: C.
Time-consuming answer: 5 seconds
60.PGP encryption technology is email encryption software based on _ _ _ _ _ system. (Problem solving skills:)
A.RSA public key encryption
DES symmetric key
C, MD5 digital signature
D, MD5 encryption
Correct answer: a
Time-consuming answer: 3 seconds
6 1, the main theoretical basis of PKI is _ _ _ _. (Problem solving skills:)
A, symmetric cryptographic algorithm
B, public key cryptography algorithm
C, quantum cryptography
D, abstract algorithm
Correct answer: b
Time to answer questions: 1 sec
62. _ _ _ _ _ provides directory browsing service in CA system. (Problem solving skills:)
First, the security server
B.CA server
C. registRAtion agency ra
D.LDAP server
Correct answer: D.
Time-consuming answer: 2 seconds
- Related articles
- What does "deliver to JD.com pick-up point" mean?
- On Chen Hengzhe's The Old Couple
- Do operators have the right to restrict abusive short messages?
- My husband often sends short messages to other women on my mobile phone.
- Who has any funny jokes? Let's hear them and get a reward!
- What kind of girls do boys dislike?
- What campus activities are worth participating in in Huzhou Normal University?
- What is the significance of the emergence of intelligent unmanned ships in China?
- What is the short message that Hangzhou women receive?
- I want to buy a fund, how do I buy it?