Current location - Quotes Website - Signature design - Computer network security technology test questions
Computer network security technology test questions
1. The most effective way to protect email is to use an encrypted signature, such as (b) to verify email information. By verifying the e-mail, you can ensure that the e-mail really comes from the sender and has not been modified during transmission.

A. Duffy-Herman

B. Good privacy (PGP)

C. Key Distribution Center (KDC)

D. ideas

2. If a hacker wants to control some users, he needs to install the Trojan horse program into the user's machine, but what is actually installed is (b).

A. Trojan horse control plan

B. Trojan server-side program

C. No installation is required

D both the control program and the server program must be installed.

3. The following does not belong to the packet filtering inspection is (D)

A. source address and destination address

B. Source and destination ports

C. agreement

D. Content of the data packet

4. As a firewall technology, proxy service is mainly implemented in which layer of OSI (A).

A. data link layer

B. Network layer

C. presentation layer

D. application layer

The function of encryption on the Internet is to prevent valuable information from being accessed on the Internet (D).

A. Interception and sabotage

B. Interception and theft

C. tampering and damage

D. Tampering and stealing

6. According to the trusted computer evaluation standard, the operating system whose security level meets the requirements of C2 level is (D).

A. Disk operating system

B.Windows XP

C.windows operating system

D.Unix operating system

7. In the following description of password security, the mistake is that (b and d are not very correct. . )`

A. passwords should be changed regularly.

B. The longer the password, the safer it is.

C. Easy-to-remember passwords are unsafe

The more characters used in a password, the less likely it is to be guessed.

8. User authentication in asymmetric encrypted communication is determined by (b).

A. Digital signature

B. digital certificates

C. Message summary

D. public-private key relationship

9. For IP spoofing attacks, what the filtering router cannot guard against is (D).

A. external IP spoofing disguised as an internal host

B. IP spoofing of external hosts

C. IP spoofing disguised as an external trusted host

D. the internal host deceives the IP address of the external network.

10. The advantage that RSA encryption algorithm does not have is (D).

A. keys can be issued by ca center to ensure the security and convenience of key distribution.

B. User authentication is available.

C. information authentication is possible.

D, fast running speed, can be used to encrypt a large number of data.

11.encryption algorithm adopted by PGP encryption software (C)

A. Data encryption standards

B. Republic of South Africa

C. knapsack algorithm

D. ideas

12. The following statement is true (D)

A. Trojans are not as destructive as viruses.

B. Trojans don't copy themselves like viruses.

C. Trojans are not independent programs like viruses.

D. Trojans and viruses are independent programs.

13. When using antivirus software, users are generally required to upgrade once every two weeks. The purpose of this is (c).

A. To deal with the latest virus, you need to download the latest program.

B. There are errors in the program, which need to be continuously upgraded to eliminate bugs in the program.

C new viruses appear constantly, so it is necessary to update the virus feature database in time.

D. None of the above statements is true.

14. From the perspective of firewall security, the best firewall structure type is (D).

A. Router type

B. Server type

C. shielding host structure

D. shielding subnet structure

The rest will be made up by experts.