Network security risk knowledge contest questions

1. The following statements about network security are correct:

As long as antivirus software is installed, the network is safe

As long as a firewall is installed, the network is safe

As long as a password is set, the network is safe

There is still no absolutely safe network, and netizens should pay attention to protecting personal information

2, Computer virus refers to the preparation or inserted in the computer program (), affecting the use of the computer, and can be self-replicating set of computer instructions or program code.

Hazardous to the health of the operator

Destruction of data

Hazardous to the safety of the server room environment

3. The user receives a suspicious e-mail asking for the user's bank account and passwords, which belongs to what kind of attack?

Cache Overflow Attack

Phishing Attack

Hidden Door Attack

DDOS Attack

4. Among the following authentication methods, the most commonly used authentication method is:

Based on Account Name/Password Authentication

Based on Digest Algorithm Authentication

Based on PKI Authentication

Based on database authentication

5, the following does not belong to the system security technology is:

Firewall

dongle

authentication

anti-virus

6, against e-mail invasion measures, is not correct:

do not use the birthday as a password

do not use less than 5-digit password

do not use a pure password

do not use a pure password

do not use a pure password

do not use a pure password

do not use a pure password

do not use a pure password

No need to use pure numbers

Make your own server

7, not a common dangerous password is:

The same password as the username

Use your birthday as a password

Only 4-digit password

10-digit comprehensive password

8, SQL Killer Worm attack is characterized by:

The SQL Killer Worm attacks Characterized by:

Consuming a lot of network bandwidth

Attacking personal PC terminals

Destroying PC game programs

Attacking cell phone networks

9. Many hacker attacks take advantage of buffer overflow vulnerabilities in software implementations, what is the most reliable solution to this threat?

Install a firewall

Install an intrusion detection system

Install the latest patches on your system

Install anti-virus software

10. What is not a strategy for preventing and controlling computer viruses:

Make sure that you have a really "clean" boot disk handy

Make sure that you have a really "clean" boot disk handy. boot disk

Timely and reliable upgrade of anti-virus products, new computer software should also be virus detection

Organize the disk

11, which of the following is an example of data integrity is protected?

A Web site limits the number of user connections when there is a sudden increase in the number of visitors to ensure that logged-in users can complete their operations

An ATM terminal malfunctions during a withdrawal, and the banking system corrects the user's account balance in a timely manner

A network management system has a rigorous auditing function that determines which administrators performed what operations on the core switches and when

A network management system has a strict audit function that determines which administrators performed what operations on the core switches and when

Mr. Li locks important documents in a confidential cabinet in the filing room before the end of each day, making it impossible for commercial spies disguised as Qinggu workers to view them

12. Which of the following methods is not effective in improving the security of a WLAN:

Modify the default service area identifier (SSID)

Disable SSID broadcasting

Enable the endpoints to broadcast SSIDs to the public

Enable the endpoints to broadcast SSIDs to the public. p>

Enable terminal to AP. Two-way authentication

Enable open authentication mode for wireless APs

13. Which of the following wireless encryption standards has the weakest security?

wep

wpa

wpa2

wapi

14.Which of the following options is not a source of information security requirements?

Requirements of laws, regulations, and contracts

Organizational principles, goals, and regulations

Results of risk assessments

Vulnerability and virus alerts issued by security architectures and security vendors

15. The following is true with respect to the principle of Least Privilege security management. The following is correct:

Special positions within an organization cannot be handled by a single person for an extended period of time

Important tasks are broken down and assigned to different people

A person has, and has only had, enough permissions and privileges for the position he or she is performing

Preventing an employee from moving from position to position and accruing more and more privileges

16. A user receives a suspicious e-mail asking for a bank account and password.

Cache Overflow Attack

Phishing Attack

Hidden Door Attack

DDOS Attack

17, the following statements about access control are correct:

An access control model is a description of a set of access control rules collection, which must be formalized

The general access control process consists of: subject, object, access control decisions and access control implementation of four parts

Access control model is a description of a series of security policies, are non-formal

In the access control process, the subject submitted by the access control decision-making implementation of the access

18, Trojan Horse program generally refers to the user's computer lurking with a malicious nature of the (), the use of which can steal important data on the Internet user's computer without the user's knowledge.

Remote control software

Wooden horse

19, the following attack step is IP spoofing (IP Spoof) series of attacks in the most critical and most difficult?

Perform a denial-of-service attack on the impersonated host to prevent it from responding to the target host

Conduct a session with the target host to guess the target host's serial number rule

Impersonate a trusted host to send packets to the target host to deceive the target host

Send commands to the target host to perform a session operation

20. network Hacker is a person who uses abnormal means through the Internet to:

surf the Internet

cheat on the Internet

invade a computer system

21. The following are not part of the security reinforcement measures for Internet banking:

download and install security controls on the website

download and install client software on the website

Internet banking USB

Key Driver

Network Card Driver

22. The following are not network security payment tools:

U Shield

Internet Banking Certificate

SMS Verification Code

Financial IC Card

23. Internet Banking is suitable for use in the following places:

Public

Computers in other people's computers

Computers in Internet cafes

Computers at home

24. The process of online payment is not very useful for improving security:

Please make sure that the URLs in the address bar are correct when you transact with them

Go to a regular, well-known online shopping mall to make online payment when shopping online

The Internet is not a good place to pay online.

When trading, you can turn off your Office and chat software.

Don't leave the transaction terminal before the transaction is completed, and click exit after the transaction is completed

25. Which of the following online payment tools is the most secure:

Internet banking certificate + SMS password

USB

Key + SMS password

USB

Key

Electronic Password device

26, the following are not common security risks in online payment:

Phishing

Trojan horse

Social traps

Pseudo-base stations

Network DOS attacks

27, the following are the deceptive means of phishing:

The unscrupulous elements send out a large number of messages claiming to be from banks or other well-known institutions. By sending a large number of deceptive spam emails or SMS, instant messaging messages, etc., claiming to come from banks or other well-known organizations, the unscrupulous elements lure the recipients to give sensitive information (such as user name, password, account

ID

or credit card details)

Usually disguised as program packages, compressed files, pictures, videos, etc., and through the web page, e-mail and other channels to lure users to download and install

Unscrupulous elements searching for the following means of phishing

The following are some of the fraudulent means:

The unruly elements searched for cell phone card information within a certain range around the device, and through the base station disguised as an operator, pretended to be an arbitrary cell phone number to force the user's cell phone to send short messages such as fraud.

Some unscrupulous elements utilize social engineering to obtain cardholder personal information and steal cardholder account funds through some important information.

28. The following are of little use in improving the security of online payments:

Don't deposit too much money in the bank card that is often used for online payments, or set a daily maximum online spending limit to minimize losses.

Don't carry your bank card with you

Set different passwords for different online payment accounts.

Computers, pads, cell phones and other tools used for online payment should be installed with antivirus software and regularly checked for viruses.

29, the following about the advantages of financial IC card embodiment, is not correct:

High security. Financial IC card information stored in the smart chip, the card information is difficult to copy, coupled with multiple transaction authentication process, can effectively protect the cardholder bank account funds security.

Fast and convenient. In addition to all the functions of a magnetic stripe card, a financial IC card can also be used for contactless fast micropayments, making it easy to pay with a single swipe, which is convenient and fast

Multi-purpose card. The financial IC card can be used in social security, transportation, medical care, education and other public **** field

Wide range of use. The financial IC card handled at home can be used in most countries abroad.

30, the following about the financial IC card, is incorrect:

Financial IC card with smart chip, can set social security, transportation, medical, education, communications, shopping, entertainment, water, electricity and coal payment and other industry applications in one, to achieve the "card multi-purpose".

The contactless fast small amount payment function of financial IC card can be widely used in supermarkets, convenience stores, department stores, pharmacies, fast food chains and other retail places and food markets, parking lots, gas stations, tourist attractions, and other public **** services, a wave can be paid

The information of financial IC card is stored in the smart chip, the card information is difficult to duplicate, coupled with multiple transaction authentication process, which can effectively protect the cardholder's identity.

The financial IC card information is stored in the smart chip, the card information is difficult to copy, coupled with multiple transaction authentication process, can effectively protect the cardholder's bank account funds security.

After the closure of the degradation transaction of the financial IC card, the pure magnetic stripe bank card previously issued by commercial banks can no longer be used

The financial IC card can be used as a payment gateway for the bank account of the cardholder.