Current location - Quotes Website - Personality signature - Some questions and answers in the network security knowledge competition
Some questions and answers in the network security knowledge competition

33. The correct way to deal with backdoors in the computer field is _______.

(Problem-solving skills:)

A. The reserved backdoors must be deleted in time

B. The system is regularly disinfected

C. The system is regularly upgraded to the virus database

p>

D. None of the above statements are correct

Correct answer: B

Answering time: 1 second

34. Which of the following statements about broiler chickens Correct_______ (problem-solving skills:)

A. The machine that launched the active attack

B. The machine that was implanted with a Trojan by a hacker. The hacker controlled the broiler to participate in the attack through the Trojan control terminal

C. Users usually voluntarily become broilers

D. Broilers cannot launch attacks

Correct answer: B

Answering time: 5 seconds

35. What is incorrect about distributed denial-of-service attacks is _______ (problem-solving skills:)

A. Attackers generally send reasonable service requests

B. Attackers can use broilers to coordinate attacks

C. Attackers attack targets by sending viruses

D. Attackers’ attack methods include DOS and DDOS

Correct answer: C

Answering time: 1 second

36. The network server is flooded with a large number of messages requiring reply, which consumes bandwidth and causes the network or system to stop normal services. What type of attack is this? _______ (Problem-solving skills:)

A. Denial of service

B. File sharing

C. BIND vulnerability

D. Remote procedure call

Correct answer: A

Answering time: 2 seconds

37. Which of the following statements about how to prevent ferry attacks is correct_______ (Problem-solving skills:)

A. Install anti-virus software

B. Install firewall

C. It is prohibited to cross-use U disks between two information systems

D. Encryption

Correct answer: C

Answering time: 2 seconds

38. Which of the following is not a buffer overflow vulnerability? Preventive measures _______ (problem-solving skills:)

A. Programmers should develop safe programming habits when writing programs

B. Monitor software operation in real time

 C. Change the compiler settings

D. Increase the memory capacity

Correct answer: D

Answer time: 2 seconds

39. What do ferry attacks usually use to steal data_______ (Problem-solving skills:)

A. Invade the internal network from the external network

B. Use the system backdoor to steal data

C. Use mobile carriers as "ferries"

D. Use zero-day attacks

Correct answer: C

Time to answer: 2 seconds

40. What is incorrect about zero-day attacks is _______ (problem-solving skills:)

A. Zero-day attacks are almost invincible

B. There are very few zero-day attacks

C. Zero-day attacks can be used multiple times

D. Zero-day attacks are sudden

Correct answer: C

Answer time: 1 second

41. Hackers mainly use social engineering to _______ (problem-solving skills:)

A. Make TCP connections

B. Carry out DDOS attack

C. Carry out ARP attack

D. Obtain password

Correct answer: D

Answer time: 1 second

42. The main reason why sensitive data can be obtained through credential stuffing is _______ (problem-solving skills:)

A. The database does not use security protection Measures

B. Users set the same user on different websites

Name and password

C. Weak database security protection measures

D. Profit driven

Correct answer: B

Time to answer: 2 Seconds

43. The following _______ are symptoms of QQ poisoning (problem-solving skills:)

A. QQ keeps disconnecting and prompts remote login

B , There are spam advertisement logs in QQ space

C. Automatically send spam messages to friends

D. All of the above

Correct answer: D

Answer time: 1 second

44. Which of the following is a form of phishing website _______ (problem-solving skills:)

A. Company anniversary

B. Lucky spectators

C. Redeem points

D. All of the above

Answering time: 1 second

45 , the hot spot is _______ (problem-solving skills:)

A. Wireless access point

B. Wired communication protocol

C. Encrypted communication protocol

p>

D. Decrypt communication protocol

Correct answer: A

Answering time: 2 seconds

46. What is stored in the QR code is _______information. (Problem-solving skills:)

A. User account

B. Bank information

C. Website address

D. None of the above are correct

Correct answer: C

Answering time: 4 seconds

47. When using Apple products, if they want to obtain root permissions, many users take illegal measures Legal means, this method is usually called _______ (problem-solving skills:)

A. Backdooring

B. Open source

C. Free

p>

D. Jailbreak

Correct answer: D

Answering time: 4 seconds

48. Which of the following statements about spam is incorrect_ ______ (Problem-solving skills:)

A. Users’ reduced use of email is entirely due to the influence of spam

B. It reduces users’ trust in Email

 C. Mail service providers can block spam

D. Valuable information is drowned in a large amount of spam and can easily be deleted by mistake

Correct answer: A

Answering time: 3 seconds

49. In order to prevent spam emails, Internet email service providers should build Internet email service systems in accordance with the technical standards formulated by the Ministry of Information Industry. Email server _______ anonymous forwarding function. (Problem-solving skills:)

A. Use

B. Turn on

C. Turn off

Correct answer: C

Answer time: 12 seconds

50. In network security, interruption refers to an attacker destroying the resources of the network system, making it invalid or useless. This is true for_______.

(Problem-solving skills:)

A. Availability attack

B. Confidentiality attack

C. Integrity attack

D. Authenticity attack

Answering time: 2 seconds

51. The most accurate description of the root causes of information security problems below is: _______ (problem-solving skills: )

A. Information security problems are caused by the continuous development of information technology

B. Information security problems are caused by hacker organizations and criminal groups pursuing fame and fortune

C. Information security problems are caused by negligence in the design and development process of information systems

D. The internal cause of information security problems is the complexity of the information system, and the external cause is the threat and threat of opponents Destruction

Correct answer: D

Answering time: 2 seconds

52. The main methods of risk assessment are _______. (Problem-solving skills:)

A. Qualitative

B. Quantitative

C. Combination of qualitative and quantitative

D. Above All

Correct answer: D

Answering time: 7 seconds

53. Information network security (risk) assessment method _______ (problem-solving skills :)

A. Combination of qualitative evaluation and quantitative evaluation

B. Qualitative evaluation

C. Quantitative evaluation

D. Fixed point Assessment

Correct answer: A

Answering time: 1 second

54. The Orange Book defines 4 security levels, starting from level D (lowest protection layer) to layer A (verification protection layer), systems belonging to level D are unsafe, and the following operating systems that do not belong to level C are _______. (Problem-solving skills:)

A. UNIX system

B. LINUX system

C. WINDOWS2000

D. WINDOWS98

p>

Correct answer: D

Answering time: 1 second

55. Why is cryptography _______ (problem-solving skills:)

A. Confidential information

B. Fun

C. Call

D. Send text messages

Correct answer: A

Answering time: 2 seconds

56. In the public key system, the public key is used for _______ (problem-solving skills:)

A. Decryption and signature

B. Encryption and signature

C. Decryption and authentication

D. Encryption and authentication

Correct answer: D

Answer time: 11 seconds

57. Suppose an encryption algorithm is used. Its encryption method is very simple: add 5 to each letter, that is, a is encrypted into f. The key of this algorithm is 5, then it belongs to _______. (Problem-solving skills:)

A. Symmetric encryption technology

B. Block cipher technology

C. Public key encryption technology

D. One-way function cryptography technology

Correct answer: A

Answering time: 3 seconds

58. The following description of DES is correct_ ______. (Problem-solving skills:)

A. It was jointly proposed by IBM, Sun and other companies

B. Its algorithm is not public but the key is public

 C. Its structure completely follows the complex structure network

 D. It is currently the most widely used block cipher algorithm

Correct answer: D

Answer the question Time taken: 1 second

59. The meaning of "public key cryptography system" is _______.

(Problem-solving skills:)

A. Make all keys public

B. Make the private key public and keep the public key secret

C. The key is public and the private key is kept secret

D. The two keys are the same

Correct answer: C

Answer time: 5 seconds

60. PGP encryption technology is an email encryption software based on _______ system. (Problem-solving skills:)

A. RSA public key encryption

B. DES symmetric key

C. MD5 digital signature

D. MD5 encryption

Correct answer: A

Answering time: 3 seconds

61. The main theoretical basis of PKI is ____. (Problem-solving skills:)

A. Symmetric cryptography algorithm

B. Public key cryptography algorithm

C. Quantum cryptography

D , Summary algorithm

Correct answer: B

Answering time: 1 second

62. _______ provides directory browsing services in the CA system. (Problem-solving skills:)

A. Security server

B. CA server

C. Registration authority RA

D. LDAP Server

Correct answer: D

Answering time: 2 seconds