Joke Collection Website - Blessing messages - Answer to the secret knowledge contest, ask for help.
Answer to the secret knowledge contest, ask for help.
1. When interviewed by reporters during administrative law enforcement, the staff of a certain department thought that this was information that should be made public and truthfully disclosed the law enforcement situation to reporters. This is his behavior.
A, normal disclosure of government information b, unauthorized disclosure of government information c, news reports with personal responsibility.
2. In order to improve the service efficiency, an economic department has set up an enterprise information column on the information disclosure website to timely publish and update the statistical information of production and operation reported by various enterprises. This is an act.
A. Normal disclosure of government information B. Illegal disclosure of government information
C. Disclosure of business secrets of enterprises
3. Xiao Wang is a staff member of the information disclosure office of a unit. He checked the information to be disclosed against the information disclosure catalogue and directly handed it over to the network administrator for release. What he did was a performance.
A, normal performance of duties B, unauthorized release of government information
C, violation of information disclosure audit procedures
4, China's computer information system security classification protection level is divided into [].
A, business secret level, work secret level, state secret level B, Internet, domestic public network, government extranet, government intranet, classified network C, independent protection level, guidance protection level, supervision protection level, compulsory protection level and special control protection level.
5. The staff of an agency copied the unfinished confidential documents to a USB flash drive and took them home. They worked overtime on the Internet computer, and the result was stolen by Trojan, the remote controller implanted in the computer. This behavior should be determined according to [].
A. negligent disclosure of state secrets B. intentional disclosure of state secrets C. illegal provision of state secrets
6. Xiao Li works in the department office and often drafts confidential documents and leaders' speeches. Usually she needs to collect some information online and download it to the office computer with a USB flash drive. He should take [] measures before copying the downloaded data to a confidential computer.
A, killing Trojan virus on Internet computers; B, firstly, killing the Trojan virus on the classified computer; And kill Trojan virus on the intermediate computer.
7. It is mainly to prevent secret-related computers and Internet computers from cross-using USB flash drives.
A, USB flash drive ferry Trojan steal B, remote control Trojan steal C, confidential computer infected with virus.
8. Confidential computers are prohibited from using other people's or unknown mobile storage media mainly to prevent [].
A, infected with computer virus B, implanted with Trojan remote control C, and the program was stolen by Ferry Troy.
9. Download information from the Internet to a confidential computer or office computer. In order to prevent the ferry from stealing secrets, the safest way at present is to use [] to download.
A, CD B, u disk c, mobile hard disk
10. There is something wrong with Xiao Zhang's confidential computer. Please ask the after-sales service personnel to come to the house for repair. In order to prevent data loss, the repairman first backs up the data with his mobile hard disk, repairs the machine, then copies the data to the computer, and deletes all the backed-up data under the supervision of Xiao Zhang. Xiao Zhang has a confidentiality problem in the [] link.
A, please after-sales service personnel to repair; B, backup data with the repairman's mobile hard disk; C supervise the deletion of all backup data.
In the questions 1 1 and 10, the main hidden danger is [].
A, maintenance personnel see confidential information b, maintenance personnel secretly copy confidential information c, deleted backup data can be recovered by data recovery software.
12. In order to prevent the laptop from being robbed and stolen, security measures should be taken.
A, confidential information is separated from the laptop and carried with you; B, the thief can't reach it by mail or consignment; C. The thief can't open the computer by setting a password.
13. The biggest hidden danger of using Centrino technology to process and store confidential information is [].
A, wireless Internet access makes confidential information out of control; B, it automatically links with the notebook computer using Centrino technology within a certain distance, so that confidential information is out of control; C, it can automatically send confidential information.
14. An office bought an office automation machine with storage function. In order to facilitate the work, it was placed in the lobby where people come and go very conveniently. Office workers can print, copy documents and send faxes by themselves as needed. Doing so is prone to problems.
A, free use by foreign office workers; B, illegal operation damages the equipment.
Anyone can easily retrieve and copy all the processed information.
15. Party and government organs and secret-related units should take [] security measures for all-in-one office automation machines with storage function.
A, the specialist is responsible for B. C is used after personal examination and approval, and training in operating procedures is conducted.
16. It is forbidden to use external audio and video equipment to chat and talk on computers specially used for surfing the Internet in secret places, mainly to prevent problems from happening.
A. Chatting on the Internet during working hours B. The location of the confidential place is exposed
C. Audio and video equipment is manipulated by hackers as eavesdropping and candid camera tools.
17. In order to prevent the [] problem, it is forbidden to use peripheral devices such as wireless mouse, wireless keyboard and wireless network card for classified computers.
A, air signal interception and theft b, illegal Internet access c, lost or taken away.
18, mobile storage media has the characteristics of "once classification, forever classification", which is determined by the characteristics of mobile storage media.
A, small size, easy to lose; B, large storage capacity; C, easy to restore deleted data.
19. It is forbidden to bring mobile phones to important confidential meetings, activities and places, mainly to prevent problems.
A, mobile phone ringtones interfere with the order of the venue. B, the mobile phone is turned into eavesdropping by remote control.
C. making personal calls affects normal work.
20. Xiao Zhang is a computer geek. When he is working in the office, he has nothing to do but loiter on the confidential network of the company. He will try his best to break the restriction of network authorization and download files to his computer. His behavior is [].
A, stealing secrets b, leaking secrets c, violating regulations
2 1. It is an act of [] for the staff of state organs to inform their relatives and friends of the state secrets they know.
A. divulging state secrets B. violating confidentiality provisions C. illegally providing state secrets.
22. State secret documents or confidential mobile storage media are lost or hidden, and remedial measures are not taken, which belongs to [Leak Incident].
A, the circumstances are serious B, general C, and the circumstances are minor
23. Computers or internal networks that store and process state secret information must take security measures with the Internet or other public networks.
A. Logical isolation B. User authentication C. Physical isolation
24, the party and government organs and units of public information confidential review, by [] is responsible for.
A, the organization that publishes information B, the competent department of government information
C, confidential departments at the same level
Second, multiple-choice questions (choose one or more correct answers)
25, information disclosure safety review procedures include ().
A, the undertaker's preliminary examination b, the competent department or personnel's examination c, the confidential organization's examination and confirmation d, the competent leader's examination and approval e, the matters submitted for examination are not clear f, and the main leaders issue g and written records.
26, information disclosure and confidentiality review should adhere to the principle of ().
A, who is open, who reviews the principle B, the principle of combining self-examination with submission.
C, the principle of combining the review catalogue with the review content D, the principle of prior review E, the principle of legal review F, the principle of facilitating work G, and the principle of responsibility.
27. The Internet is in danger of leaking secrets, and the core technology of the network is in the hands of foreigners. At present, the technical level of network security prevention in China is low. In order to ensure the security of state secrets, classified computers and classified networks must be physically isolated from the Internet and public networks.
A, remote control of Trojan stealing b, network vulnerability attack stealing c, network data capture stealing d, electromagnetic radiation leakage of computer and its affiliated equipment e, transmission channel interception stealing f, hacker unauthorized access to stealing g, and U disk ferry Trojan stealing.
28, in order to prevent the loss of confidential laptop, stolen confidential data out of control, () security measures should be taken.
A, confidential information is separated from the laptop; B. Mobile hard disk, U disk, CD and other carriers storing confidential information are stored and managed according to files with the same security level; C, the mobile storage medium for storing confidential information is placed separately from the computer; D, the computer is locked in the tin cabinet when not in use; E, carry a computer with you when you go out; And carry a mobile carrier with you when you go out, and it will be used and kept by a special person.
29. When using a mobile phone, you should strictly abide by the prohibition of sexual behavior such as ().
A, don't talk about confidential matters and confidential information b, don't send confidential messages.
C, don't store confidential information d, don't take confidential photos e, don't record confidential audio-visual materials f, don't bring them into important confidential meetings and core confidential places g, don't use them at work.
30. In order to prevent the leakage caused by mobile phone location and eavesdropping function, important secret-related meetings, secret-related activities, core secret-related places and core secret-related personnel should take technical shielding measures for mobile phones. At present, the main measures to block mobile phones are ().
A, install the mobile phone signal shielding instrument B, shield the office building as a whole C, put the mobile phone into the shielding bag D, use the mobile phone shielding room E, and put the mobile phone into the shielding.
F, remove the mobile phone battery g, equipped with a safe mobile phone.
3 1, maintain confidential computers or confidential mobile storage media, and strictly abide by the confidentiality specifications such as ().
A, in the designated units approved by the security department maintenance b, specialized maintenance by the unit.
Technicians carry out maintenance C. After-sales service personnel send people to supervise maintenance.
D. Dismantle the classified hard disk E when sending it to the after-sales service department for maintenance, send someone who can't disassemble the hard disk to supervise the maintenance F. Do not use the mobile storage medium of the maintenance personnel to back up the data G. Do not allow the maintenance personnel to check the office folder.
32, classified computers and classified network computers are forbidden to connect and use ().
A, wireless mouse B, wireless keyboard C, wireless network card D, mobile storage medium E of unknown origin, ordinary printer F, and multifunctional machine G for connecting ordinary fax and audio and video equipment.
33, involving state secrets meeting, the organizer shall seriously take measures ().
A, select qualified confidential places; b, limit the scope of participants according to work needs; d, educate participants on confidentiality; e, specify confidentiality requirements; f, use conference equipment according to confidentiality provisions; g, manage conference documents and materials according to confidentiality provisions; and determine whether the contents of the conference are communicated and the scope of communication.
34, in order to prevent the ferry Trojan stolen, classified computers and classified computer network terminals should take measures such as ().
A unified registration and management of removable storage media; B, carrying out special identification management according to the purpose of the mobile storage medium; C. It is forbidden to cross-use mobile storage media between Internet, secure network and secure computer; Prohibit the use of confidential mobile storage media on Internet computers; E. It is forbidden to use private mobile storage media on classified computers and classified network terminals; Secret-related computers and secret-related network terminals are prohibited from using the mobile storage medium G with unknown origin and purpose, and strict technical protection measures are taken to copy the information on the Internet to the secret-related computers and secret-related network terminals.
35, involving state secrets of communication, office automation and computer information system must be completed () and other security systems and facilities and standards, before operation.
A, classified information security system and management system B, measures for isolation from the Internet C, measures for identity authentication D, measures for access control E, measures for encryption of classified information storage and transmission F, measures for audit tracking G, and measures for preventing electromagnetic leakage.
36, storage of state secret information of various computer storage media, () security measures should be taken.
A, indicate the safety level B, manage C according to the corresponding safety documents, use D without lowering the safety level, destroy E in time when it is no longer used, ensure that information is not leaked during maintenance, delete safety-related information in time when lending it to others, and manage printed safety-related information according to the corresponding safety documents.
37, the daily activities of security personnel must conform to the code of conduct such as ().
First, don't reveal state secrets in private contacts; B. Private communication should not involve state secrets; D. Do not handle state secrets in public places; E, don't talk about state secrets on mobile phones and ordinary phones; G, don't pass state secrets by ordinary mail; Don't leave the country without permission.
38. At present, overseas intelligence agencies mainly use () to steal mobile phone secrets.
A, mobile phone aerial signal interception system eavesdrops on conversation content b, eavesdrops on specific mobile phone conversation content c by using spy software such as "mobile phone undercover", steals stored information d by using "Bluetooth" secret stealing software, presets a secret stealing electronic module in the mobile phone, and eavesdrops remotely if necessary e, determines the whereabouts of important secret-related personnel and the location of important secret-related places f by using the mobile phone positioning function, intercepts mobile phone short messages to obtain valuable information g, and monitors wireless Internet access mobile phones through the Internet.
39, copy the carrier of state secrets, shall abide by the confidentiality provisions are ().
First, the top secret level should be approved by the issuing unit or its higher authorities; B, the issuing authority allowed to copy the confidential and confidential carrier, should be approved by the unit leader; C, the original secret level, confidentiality period and scope of knowledge should not be changed; E. Registration procedures to be performed; F, copy should be stamped by the copy unit; G, copy should be regarded as the original management; If there are no conditions for copying inside the unit, it shall be copied at the designated unit determined by the security department.
40, it is strictly prohibited to mobile storage media regardless of public or private, the main purpose of cross mixing is to prevent leaks such as ().
A, the office mobile storage media is brought home by mistake, resulting in loss of control; B. Misborrowing office mobile storage media leads to loss of control; C, mistakenly copying confidential information to a private mobile storage medium; Transplanting viruses to private mobile storage media on the Internet by mistake; F mistake office mobile storage media as private media on the Internet; G. disseminating confidential information through private mobile storage media; Confidential information is "ferried" to the Internet by implanting the private mobile storage medium of the ferry horse.
Third, analyze the question of right or wrong (choose right or wrong)
4 1. The confidentiality review of information disclosure is one of the basic procedures of information disclosure and should be combined with the information disclosure procedures. A, right b, wrong
42. Computers or servers used to publish information on information disclosure websites shall not be used to directly edit the information to be disclosed without confidentiality review. A, right b, wrong
43. The information transmitted through the Internet mailbox or QQ is removed or deleted in the personal mailbox in time after being sent and received, even if it is hacked, it cannot be obtained. A, right b, wrong
44. Delete the text messages in time after receiving and sending. Only delete the text messages in the mobile phone, not the text messages in the mobile phone network server. A, right b, wrong
45. Confidential mobile storage media can only be used on the Internet after all confidential information has been deleted. A, right b, wrong
46, eliminated classified computers must be formatted in the hard disk, can be presented to other units. A, right b, wrong
47. There will be no leakage after the phone is turned off. A, right b, wrong
48. Using computers to invade classified networks and steal state secret information is an act of illegally obtaining state secrets, and should be convicted and punished according to the crime of illegally obtaining state secrets. A, right b, wrong
49. Even if the information stored in the computer storage medium is deleted and overwritten many times, it can still be recovered by deep data recovery tools. A, right b, wrong
50. Copiers, printers, fax machines and all-in-one machines with storage function for handling confidential information shall not be connected with Internet computers and ordinary telephone lines. A, right b, wrong
5 1. As long as you don't connect to the internet and answer the ordinary phone, the multifunctional machine that handles confidential information won't leak.
A, right b, wrong
52, the destruction of classified computer storage media, must be the same as the destruction of classified documents, reported to the leadership for approval, registration, it is forbidden to destroy more than two people without authorization.
A, right b, wrong
53. When going abroad on business, if there are major sensitive matters to ask for instructions and report to China, you should go to our embassy or consulate abroad by encrypted communication or send someone to handle them.
A, right b, wrong
Fifty-four, irresponsible in the confidentiality work, resulting in a major leak accident, causing or likely to cause heavy losses, leading cadres in party member who bear the main leadership responsibilities shall be given a warning within the party or a serious warning; Causing or likely to cause heavy losses, leading cadres in party member, who bear the main leadership responsibilities, shall be punished by revoking their positions within the Party.
A, right b, wrong
55. Whoever illegally holds documents, materials or other articles that are state secrets and refuses to explain their sources and uses shall be sentenced to fixed-term imprisonment of not more than three years, criminal detention or public surveillance.
A, right b, wrong
56. In violation of confidentiality provisions, the act of connecting computers or computer information systems involving state secrets to the Internet and revealing state secrets conforms to the criminal filing standards for the crime of negligent disclosure of state secrets. A, right b, wrong
The publicity of confidential meetings and activities should adhere to the principle of "whoever reports is responsible". As long as the news media are invited to report, the news media should be responsible for the confidential review of the content of the report. A, right b, wrong
58. Confidentiality is the guarantee for the smooth disclosure of information. Only by accurately determining the scope of information that cannot be disclosed, such as state secrets, and conducting confidential review on the information to be disclosed accordingly can we effectively prevent and avoid the damage caused by blind disclosure of information to national security, the interests of citizens and legal persons. A, right b, wrong
59, confidential communications, office automation and computer information systems should try to use domestic equipment, if it is really necessary to buy imported equipment, should be purchased at random from the scene, before use, strict safety technical inspection should be carried out to eliminate the hidden dangers of stealing secrets and leaking secrets. A, right b, wrong
60. Units or individuals that have made outstanding achievements in guarding state secrets and improving technical measures for confidentiality shall be rewarded. A, right b, wrong
- Previous article:What are the requirements for telecom to open international roaming?
- Next article:What are the SMS packages launched by China Mobile now?
- Related articles
- I bought tickets for Chimelong in Meituan, but now I just sent a bunch of passwords. What did I say about making an appointment? Then how should I get the ticket? What should I do now?
- A passage to retain a girlfriend
- How to inquire about the debit details of bank cards?
- How to change the mobile phone card SMS monthly in M-Zone? Thank god, help me.
- Help! My Redmi 2 phone just displayed "Sorry, the process 'con.android.phone' has stopped running. "
- Advertising promotion of restaurant opening preferential activities
- Positive short message
- Blessings for the fifth day of the first lunar month. Short blessings for the fifth day of the first lunar month in 2021.
- How do grid workers report effective events in winter?
- Let me send ub05 to 10690700367. What is this?