First, multiple-choice questions:
1, computer virus refers to a kind of _ _ _ _ that can invade the computer system, lurk in the computer system, spread and destroy the normal work of the system.
A. instruction
B. Equipment
C. Program or executable code segment
D. supporting documents
Answer: c
2. The following methods that cannot effectively prevent viruses are _ _ _ _ _.
A. Try not to use an unknown USB flash drive.
B. When using someone else's USB flash drive, first set the USB flash drive to read-only.
C. When using someone else's USB flash drive, first kill the USB flash drive with antivirus software.
D. When someone wants to copy something on their USB flash drive, first set their USB flash drive as read-only.
Answer: b
3, in order to ensure that authorized users have the legitimate right to use their own resources, the main technology used in information security is _ _ _ _.
A. Cryptosystem
B. Identity authentication
C. access control
D. completeness and non-repudiation of data
Answer: c
4, the following does not belong to the computer security technology is _ _ _ _.
A. Cryptosystem
B. Firewall technology
C. authentication technology
D. Internet of Things technology
Answer: d
5, authentication technology does not include _ _ _ _.
A. Ratification
B. Digital signature
C. Identity authentication
D. message authentication
A: A.
6, the following technical means to achieve non-repudiation is _ _ _ _.
A. access control technology
B. Antivirus technology
C. Digital signature technology
D. Firewall technology
Answer: c
7. The following methods to prevent computer viruses are _ _ _ _ _.
A. Run 360 security guards regularly
B. Upgrade antivirus software frequently.
C. Add a password to the computer
D. don't open strangers' emails easily.
Answer: c
8, the most commonly used identity authentication technology is _ _ _ _.
A. password or PIN
B. Fingerprint authentication
C. Face image recognition
D. Digital signature technology
A: A.
9, authentication technology does not include _ _ _ _.
A. Digital signature
B. Message authentication
C. Identity authentication
D. Software quality certification technology
Answer: d
10, the contents of message authentication do not include _ _ _ _ _.
A. Message sending time
B. Is the content of the message tampered with accidentally or intentionally?
C. legality of message content
D. the sequence number of the message
Answer: c
1 1. The attribute of computer security does not include _ _ _ _.
A. Reliability of information
B. Integrity of information
C. Auditability of information
D. The correctness of information semantics
Answer: d
12, the system completes the specified functions under the specified conditions and within the specified time. This attribute refers to _ _ _ _.
A. Controllability
B. completely
C. effectiveness
D. Reliability
Answer: d
13. The following statement about system update is _ _ _ _ _.
The reason why system A needs to be updated is because there are loopholes in the operating system.
B. After the system is updated, it can no longer be attacked by viruses.
C. Even if the computer can't access the Internet, the system will automatically update.
D All updates should be downloaded and installed in time, otherwise the system will crash soon.
A: A.
14. Among the following malicious attacks, _ _ _ _ _ belongs to active attack.
A. intercepting data packets
B. Data eavesdropping
C. data flow analysis
D. Identity impersonation
Answer: d
15, at present, the most important factor affecting computer security is _ _ _ _.
A. Computer viruses
B. Cyber attacks
C. Defects in the operating system
D. Improper user operation
Answer: b
16. The most difficult network attack to prevent is _ _ _ _ _.
A. modifying data
B. Computer viruses
C. forgery
D. eavesdropping
Answer: d
17, below, the practice that does not conform to network ethics is _ _ _ _.
A. Send e-mail to people you don't know
B. Use blogs to publish advertisements
C. Use blogs to forward unconfirmed articles that attack others
D. Use a blog to express your opinion on something.
Answer: c
18, massive use of spam, bandwidth-consuming attacks (denial of service) damage _ _ _ _.
A. Confidentiality
B. completely
C. effectiveness
D. Reliability
Answer: c
19. The following statement about firewall is _ _ _ _ _.
Firewall can be implemented without special hardware support.
B. Firewalls can effectively prevent computer room fires.
All firewalls can accurately detect that the attack comes from that computer.
D. the main technical support of firewall is encryption technology.
A: A.
20, the factors affecting the unsafe information processing link does not include _ _ _ _.
A. the input data can be easily tampered with.
B. Storage failed due to physical failure of the disk.
C. Virus attack
D. chop
Answer: b
2 1, authorized legal users can't get the corresponding service, which destroys the _ _ _ of information.
A. non-repudiation
B. completely
C. Confidentiality
D. effectiveness
Answer: d
22, computer security attributes do not include _ _ _ _.
A. confidentiality and correctness
B. completeness and reliability
C. Availability and auditability
D. Non-repudiation and controllability
Answer: d
23, the factors affecting information security do not include _ _ _ _ _ _.
A. there are unsafe factors in information processing.
B. The computer hardware design is defective
C. There are loopholes in the operating system
D. chop
Answer: b
24, the following people malicious attacks, belong to the active attack is _ _ _ _ _.
A. delete messages that others are sending.
B. Data eavesdropping
C. data flow analysis
D. intercepting data packets
A: A.
25, the factors that affect the security of the system do not include _ _ _ _.
A. There are many malicious "hot links" on the webpage.
B. the output device is easy to cause information leakage or theft.
C. Virus attack
D. There are loopholes in the operating system
A: A.
26, the first formal standard of computer system security assessment is _ _ _ _.
A. TCSEC formulated by the United States
B. CISEC formulated by the Ministry of Information Industry of China
C.IEEE/IEE
D. all of the above are wrong
A: A.
27, about the software used in the computer, the narrative error is _ _ _ _ _.
A. software condenses the labor achievements of professionals.
B.software is like a book. Borrowing and copying won't hurt anyone.
Copying software without the consent of the software copyright owner is an infringement.
Software, like hardware, is a commodity.
Answer: b
28, which of the following does not belong to the common information security problem _ _ _ _.
A. Deliberate sabotage on the Internet, such as tampering with other people's web pages without their permission.
B. invasion of privacy or theft of confidential information
C. Denial of service means that an organization or institution cannot complete its due network service due to intentional or unintentional external factors or omissions.
D. print the document on a printer other than * * *.
Answer: d
29. The following is _ _ _ _ _ _ _ which does not conform to the network ethics.
A. tell friends how to prevent viruses.
B. Provide practice for friends to download video files online.
C. criticizing friends by e-mail
D. out of curiosity, use the internet to eavesdrop on friends' phones.
Answer: d
30. The following conform to the norms of network behavior is _ _ _ _ _ _ _.
A. Send a lot of spam to others
B. Deciphering other people's passwords
C. unauthorized use of other people's computer resources
D. upgrade the antivirus software version for free.
Answer: d
3 1. Among the following options, _ _ _ _ _ _ does not belong to the characteristics of computer viruses.
A. hide
B. periodicity
C. derivative
D. dissemination
Answer: b
32, the so-called computer virus is _ _ _ _.
A. due to the unstable power supply of the computer, the computer is unstable.
B. The program hidden in the computer will run when the conditions are right, which will destroy the normal work of the computer.
C. The computer hardware system is damaged, resulting in intermittent computer circuits.
D. the CD is moldy.
Answer: b
33. The following forms of active attack are _ _ _ _ _.
A. Eavesdropping and counterfeiting
B. replay and denial of service
C. Eavesdropping and viruses
D. intercept data packets and replay them.
Answer: b
34, the most commonly used identity authentication technology is _ _ _ _.
A. password or PIN
B. Fingerprint authentication
C. Face image recognition
D. Digital signature technology
A: A.
35, the following violation of network ethics is _ _ _ _ _.
A. Provide practice for friends to download video files online.
B. publishing academic papers with errors on the Internet
C. provide a method for friends to crack encrypted files.
D. send an advertising email to a stranger.
Answer: c
36, the spread of computer viruses can't spread through _ _ _ _ _.
USB flash disk
B. hard disk
C. electronic posts and telecommunications
D. central processing unit
Answer: d
37. The purpose of source identification is _ _ _ _.
A. verify the authenticity of the sender's identity
B. Verify the authenticity of the recipient's identity
C. verify the authenticity of the sent message.
D. verify the authenticity of the accepted message.
A: A.
38, the following belongs to the technical means of active attack is _ _ _ _.
A. Data interception
B. eavesdropping
C. denial of service
D. flow analysis
Answer: c
39, authentication technology does not include _ _ _ _.
A. Message authentication technology
B. Identity authentication technology
C. Digital signature technology
D. Virus identification technology
Answer: d
40, the way the virus spread through the network does not include _ _ _ _.
A. file transfer
B. e-mail
C. printers
D. Web page
Answer: c
4 1. In the network security service system, security services do not include _ _ _ _.
A. Data security services
B. Access control services
C. semantic checking service
D. Certification services
Answer: c
42, computer virus is a special computer program, the following statement is wrong _ _ _ _ _.
A. Computer viruses are covert, destructive and contagious.
Computer viruses are contagious, executable and destructive.
C computer viruses are hidden, latent and derivative.
Computer viruses are contagious, immune and destructive.
Answer: d
43. The International Standardization Committee's interpretation of "computer security" does not include _ _.
A. Computer hardware system security
B. Computer software system security
C. Data security in computer systems
D. Personal safety of operators involved in system operation
Answer: d
44. The error about system update is _ _ _ _.
A. system updates can be found in the control panel.
B. System update does not mean reinstalling the system.
C. users can check the installed updates.
D system updates will not be attacked by computer viruses in principle.
Answer: d
45, computer viruses will not cause damage to the computer is _ _ _ _ _.
A. Hardware
B. Data
C. Appear
D. procedure
Answer: c
46, the following malicious attacks, belong to the active attack is _ _ _ _ _.
A. Identity impersonation
B. Data eavesdropping
C. data flow analysis
D. intercepting data packets
A: A.
47, intrusion detection is to detect _ _ _ _.
A. Are there any signs of violating security policies and being attacked in the system?
B. Is there any hardware failure in the system?
C. Is there any software in the system that needs to be upgraded?
D. Is the system running at an abnormal speed?
A: A.
48. In the following cases, the attack that does not destroy data availability is _ _ _ _ _.
A. modify the rights of others to use data files.
B. Send a lot of spam to the website
C. Deliberately sending emails with viruses to others.
D. data is eavesdropped during transmission.
Answer: d
49, in view of the infectivity of computer viruses, the correct statement is _ _ _ _ _.
Computer viruses can spread to computers that are not infected with this virus.
Computer viruses can be transmitted to operators who use computers.
Computer viruses will not spread to sterilized computers.
Computer viruses will not spread to computers with anti-virus software installed.
A: A.
50. The following way of passive attack is _ _ _ _ _.
A. denial of service
B. Forgery
C. eavesdropping and decoding
D. modifying information
Answer: c
5 1, the phenomenon caused by the virus is most likely _ _ _ _.
A. the u disk cannot be opened normally.
B. after the power is turned on, the indicator light does not light up.
C. the use of the mouse is good and bad.
D. garbled mail
A: A.
52, computer viruses can't be hidden in _ _ _ _.
A. In the network card
B. Applications
C.Word document
D. e-mail
A: A.
53. The following statement about computer viruses is _ _ _.
A. Genuine software will also be attacked by computer viruses.
The main task of firewall is to prevent virus from infecting your computer system.
C. Anti-virus software cannot detect viruses in compressed files.
D. computer viruses are immune.
A: A.
54, the following does not belong to the characteristics of computer virus is _ _ _ _.
A. infectivity
B. lurk
C. Predictability
D. harmful
Answer: c
55, the following can't effectively prevent computer viruses is _ _ _ _.
Use "Defragmentation" in the system tool to clean up the disk fragmentation regularly.
B. Use antivirus software regularly.
C. regularly upgrade antivirus software.
D. back up important data regularly.
A: A.
56. The following statement about computer viruses is _ _ _.
A. computer viruses cannot destroy software systems.
Computer antivirus software can detect and remove all viruses.
C. the spread of computer viruses is conditional.
D. it is impossible for computer viruses to infect encrypted files.
Answer: c
57, authentication technology does not include _ _ _ _.
A. Message authentication
B. Identity authentication
C. artificial intelligence technology
D. digital signature
Answer: c
58. The following statement is true _ _ _ _ _.
A. system update includes office software update.
B. System updates include updates of anti-virus software.
C. system update includes the update of database management system.
D. System updates include security updates.
Answer: d
59. The options in the Automatic Update dialog box do not include _ _ _ _ _.
A. automatic
B. Delete the automatic update software
Download the update, but I decide when to install it.
Notify me when downloads are available, but don't download or install updates automatically.
Answer: b
60, the reason for the system update is _ _ _ _.
A. fix the vulnerability of the operating system.
B. fix the damage of the program.
C. replacing the new operating system
D. Because the printer has been replaced, the driver needs to be reinstalled.
A: A.
Second, the operating system application
4 1. Please complete the following operations in the examinee folder:
(1) Create a folder of "Computer Basic Practice" under the examinee folder;
(2) Create three subfolders of text, picture and multimedia under the folder of computer basic exercises;
(3) Find the image file named "1". BMP "and copy it to the" pictures "folder.
Third, word processing.
42. Open the file "exam2.docx" in the examinee folder and complete the following operations:
(1) Set the first prefix of the first paragraph as sink.
(2) Set the font of the first paragraph (except the initial letter) as "Italic" and the font size as "No.4";
(3) Set the font of the second paragraph as "Founder Style" and the font size as "Xiaosi", and underline it with double horizontal lines.
After the operation is completed, save it in the examinee folder with the original file name.
43. Open the file "exam 18.docx" in the examinee folder and complete the following operations:
(1) Insert clip art at the beginning of the first paragraph of the text, add a 3-pound solid double solid border, and set the wrapping mode to "around";
(2) The second paragraph is divided into three columns. The width of the first column is 12 characters and the width of the second column is 14 characters. Column spacing is 2 characters, and separation lines are added between columns;
(3) The second paragraph is filled with yellow shading (applicable to paragraphs).
After the operation is completed, save it in the examinee folder with the original file name.
;