33. The correct way to deal with backdoors in the computer field is _______.
(Problem-solving skills:)
A. The reserved backdoors must be deleted in time
B. The system is regularly disinfected
C. The system is regularly upgraded to the virus database
p>D. None of the above statements are correct
Correct answer: B
Answering time: 1 second
34. Which of the following statements about broiler chickens Correct_______ (problem-solving skills:)
A. The machine that launched the active attack
B. The machine that was implanted with a Trojan by a hacker. The hacker controlled the broiler to participate in the attack through the Trojan control terminal
C. Users usually voluntarily become broilers
D. Broilers cannot launch attacks
Correct answer: B
Answering time: 5 seconds
35. What is incorrect about distributed denial-of-service attacks is _______ (problem-solving skills:)
A. Attackers generally send reasonable service requests
B. Attackers can use broilers to coordinate attacks
C. Attackers attack targets by sending viruses
D. Attackers’ attack methods include DOS and DDOS
Correct answer: C
Answering time: 1 second
36. The network server is flooded with a large number of messages requiring reply, which consumes bandwidth and causes the network or system to stop normal services. What type of attack is this? _______ (Problem-solving skills:)
A. Denial of service
B. File sharing
C. BIND vulnerability
D. Remote procedure call
Correct answer: A
Answering time: 2 seconds
37. Which of the following statements about how to prevent ferry attacks is correct_______ (Problem-solving skills:)
A. Install anti-virus software
B. Install firewall
C. It is prohibited to cross-use U disks between two information systems
D. Encryption
Correct answer: C
Answering time: 2 seconds
38. Which of the following is not a buffer overflow vulnerability? Preventive measures _______ (problem-solving skills:)
A. Programmers should develop safe programming habits when writing programs
B. Monitor software operation in real time
C. Change the compiler settings
D. Increase the memory capacity
Correct answer: D
Answer time: 2 seconds
39. What do ferry attacks usually use to steal data_______ (Problem-solving skills:)
A. Invade the internal network from the external network
B. Use the system backdoor to steal data
C. Use mobile carriers as "ferries"
D. Use zero-day attacks
Correct answer: C
Time to answer: 2 seconds
40. What is incorrect about zero-day attacks is _______ (problem-solving skills:)
A. Zero-day attacks are almost invincible
B. There are very few zero-day attacks
C. Zero-day attacks can be used multiple times
D. Zero-day attacks are sudden
Correct answer: C
Answer time: 1 second
41. Hackers mainly use social engineering to _______ (problem-solving skills:)
A. Make TCP connections
B. Carry out DDOS attack
C. Carry out ARP attack
D. Obtain password
Correct answer: D
Answer time: 1 second
42. The main reason why sensitive data can be obtained through credential stuffing is _______ (problem-solving skills:)
A. The database does not use security protection Measures
B. Users set the same user on different websites
Name and password
C. Weak database security protection measures
D. Profit driven
Correct answer: B
Time to answer: 2 Seconds
43. The following _______ are symptoms of QQ poisoning (problem-solving skills:)
A. QQ keeps disconnecting and prompts remote login
B , There are spam advertisement logs in QQ space
C. Automatically send spam messages to friends
D. All of the above
Correct answer: D
Answer time: 1 second
44. Which of the following is a form of phishing website _______ (problem-solving skills:)
A. Company anniversary
B. Lucky spectators
C. Redeem points
D. All of the above
Answering time: 1 second
45 , the hot spot is _______ (problem-solving skills:)
A. Wireless access point
B. Wired communication protocol
C. Encrypted communication protocol
p>D. Decrypt communication protocol
Correct answer: A
Answering time: 2 seconds
46. What is stored in the QR code is _______information. (Problem-solving skills:)
A. User account
B. Bank information
C. Website address
D. None of the above are correct
Correct answer: C
Answering time: 4 seconds
47. When using Apple products, if they want to obtain root permissions, many users take illegal measures Legal means, this method is usually called _______ (problem-solving skills:)
A. Backdooring
B. Open source
C. Free
p>
D. Jailbreak
Correct answer: D
Answering time: 4 seconds
48. Which of the following statements about spam is incorrect_ ______ (Problem-solving skills:)
A. Users’ reduced use of email is entirely due to the influence of spam
B. It reduces users’ trust in Email
C. Mail service providers can block spam
D. Valuable information is drowned in a large amount of spam and can easily be deleted by mistake
Correct answer: A
Answering time: 3 seconds
49. In order to prevent spam emails, Internet email service providers should build Internet email service systems in accordance with the technical standards formulated by the Ministry of Information Industry. Email server _______ anonymous forwarding function. (Problem-solving skills:)
A. Use
B. Turn on
C. Turn off
Correct answer: C
Answer time: 12 seconds
50. In network security, interruption refers to an attacker destroying the resources of the network system, making it invalid or useless. This is true for_______.
(Problem-solving skills:)
A. Availability attack
B. Confidentiality attack
C. Integrity attack
D. Authenticity attack
Answering time: 2 seconds
51. The most accurate description of the root causes of information security problems below is: _______ (problem-solving skills: )
A. Information security problems are caused by the continuous development of information technology
B. Information security problems are caused by hacker organizations and criminal groups pursuing fame and fortune
C. Information security problems are caused by negligence in the design and development process of information systems
D. The internal cause of information security problems is the complexity of the information system, and the external cause is the threat and threat of opponents Destruction
Correct answer: D
Answering time: 2 seconds
52. The main methods of risk assessment are _______. (Problem-solving skills:)
A. Qualitative
B. Quantitative
C. Combination of qualitative and quantitative
D. Above All
Correct answer: D
Answering time: 7 seconds
53. Information network security (risk) assessment method _______ (problem-solving skills :)
A. Combination of qualitative evaluation and quantitative evaluation
B. Qualitative evaluation
C. Quantitative evaluation
D. Fixed point Assessment
Correct answer: A
Answering time: 1 second
54. The Orange Book defines 4 security levels, starting from level D (lowest protection layer) to layer A (verification protection layer), systems belonging to level D are unsafe, and the following operating systems that do not belong to level C are _______. (Problem-solving skills:)
A. UNIX system
B. LINUX system
C. WINDOWS2000
D. WINDOWS98
p>Correct answer: D
Answering time: 1 second
55. Why is cryptography _______ (problem-solving skills:)
A. Confidential information
B. Fun
C. Call
D. Send text messages
Correct answer: A
Answering time: 2 seconds
56. In the public key system, the public key is used for _______ (problem-solving skills:)
A. Decryption and signature
B. Encryption and signature
C. Decryption and authentication
D. Encryption and authentication
Correct answer: D
Answer time: 11 seconds
57. Suppose an encryption algorithm is used. Its encryption method is very simple: add 5 to each letter, that is, a is encrypted into f. The key of this algorithm is 5, then it belongs to _______. (Problem-solving skills:)
A. Symmetric encryption technology
B. Block cipher technology
C. Public key encryption technology
D. One-way function cryptography technology
Correct answer: A
Answering time: 3 seconds
58. The following description of DES is correct_ ______. (Problem-solving skills:)
A. It was jointly proposed by IBM, Sun and other companies
B. Its algorithm is not public but the key is public
C. Its structure completely follows the complex structure network
D. It is currently the most widely used block cipher algorithm
Correct answer: D
Answer the question Time taken: 1 second
59. The meaning of "public key cryptography system" is _______.
(Problem-solving skills:)
A. Make all keys public
B. Make the private key public and keep the public key secret
C. The key is public and the private key is kept secret
D. The two keys are the same
Correct answer: C
Answer time: 5 seconds
60. PGP encryption technology is an email encryption software based on _______ system. (Problem-solving skills:)
A. RSA public key encryption
B. DES symmetric key
C. MD5 digital signature
D. MD5 encryption
Correct answer: A
Answering time: 3 seconds
61. The main theoretical basis of PKI is ____. (Problem-solving skills:)
A. Symmetric cryptography algorithm
B. Public key cryptography algorithm
C. Quantum cryptography
D , Summary algorithm
Correct answer: B
Answering time: 1 second
62. _______ provides directory browsing services in the CA system. (Problem-solving skills:)
A. Security server
B. CA server
C. Registration authority RA
D. LDAP Server
Correct answer: D
Answering time: 2 seconds