Chinese college students online organization to carry out "2022 national college students network security knowledge contest", through the network question and answer way to popularize network security knowledge. Here are the questions and answers I've compiled about the 2022 National Student Network Security Knowledge Contest, I hope you like it.
↓↓↓↓ Click to get "network security" related content ↓↓↓↓
★? Network Security Awareness Week summary of activities ★
★ Network Security Education Learning Experience ★
★ Network Security Knowledge Theme Class Lesson Plan ★
★ ★ Network Security Knowledge Content ★ ★
2022 National College Students Network Security Knowledge Contest Questions and Answers1
1 、 May 1, 2008, China's official implementation of --, the opening of government websites, is considered an important measure to promote government reform. ( B )
A, deepen the government reform minutes
B, the regulations on the disclosure of government information
C, the government's functional reform
D, to strengthen the disclosure of government information
2, the network "plagiarism" disputes occur frequently reflects the ( A )
A ,
B, the lack of integrity of the Internet
C, the Internet market behavior needs to be regulated
D, the lag in Internet legislation
3, cybercrime manifestations of common illegal invasion of the computer information system, damage to the Internet gambling, cyber-theft, and ( B ).
A, network fraud, criminal motives
B, cybercrime, Internet pornography
C, Internet pornography, high intelligence
D, criminal motives, high intelligence
4, the technical aspects of network security features controllability, availability, integrity, confidentiality and ( D )
A, diversity
B, complexity
B, complexity
C, operability
D, undeniability
5, in the Internet environment, the formation of online public opinion has become more complex, but roughly follow the ( C ) pattern.
A, news and information -- the formation of public opinion
B, civil opinion -- news reports
C, generate topics -- topics continue to Survival - Formation of online public opinion - Development of online public opinion - Consolidation of online public opinion
D. Generation of topics - Formation of online public opinion - Development of online public opinion - Consolidation of online public opinion - D. Generating Topics - Forming Online Public Opinion - Online Public Opinion Settles
6 、The following statement about the principle of reciprocity is incorrect ( C ).
A, the principle of reciprocity is one of the main principles of network morality
B, the exchange of network information and network services have a two-way
C, the network subject only obligations
D, the principle of reciprocity is essentially embodied in the granting of equality and fairness to the network subject
7, on December 28, 2012, the Standing Committee of the National People's Congress adopted ( A ). A ), marking the network information protection legislation opened a new chapter
A, "decision on strengthening the protection of network information"
B, "Interim Measures for the Administration of Online Games"
C, "non-financial institutions payment service management measures"
D, "Internet information management measures"
8, network information confidentiality, in a broad sense refers to ( A )
A, the use of cryptography to encrypt information to prevent information leakage and protection of information from unauthorized users
B, to ensure that the data in the process of transmission, storage, etc., not to be unlawful modification
C, the interception of data, tampering with the adoption of integrity marking of the generation and inspection techniques
D, to conserve state secrets, or without the permission of the owner of the information. Or without the permission of the owner of the information, shall not be illegal to leak the confidential information to non-authorized persons
9, the most critical and weakest link in the field of information security is ( D ).
A, technology
B, strategy
C, management system
D, people
10, network security generally refers to the network system hardware, software and its ( C ) is protected from accidental or malicious reasons and suffered damage, change, leakage, the system continues to operate reliably and normally, the network service is not interrupted.
A, files in the system
B, pictures in the system
C, data in the system
D, video in the system
11, the perpetrator intentionally create and publish harmful, false, outdated and useless undesirable information is called ( A ).
A, information pollution
B, network garbage
C, network rumors
D, false information
12, autonomy, self-regulation, ( C ) and plurality are the characteristics of network morality
A, unity
B, homogeneity
C, openness
D, complexity
D. D. Complexity
13 、 ( B ) is China's approach to the governance of the network society.
A, division of labor, all grasp **** management
B, active defense, comprehensive prevention
C, one hand on the management, one hand on the development
D, to protect the rights and interests of citizens and maintain social stability
14, information security has gone through three stages of development, which of the following does not belong to these three stages of development? ( D )
A, communication confidentiality stage
B, data encryption stage
C, information security stage
D, security stage
15, hackers use the IP address to attack the method: ( A )
A, IP deception
B, decryption
C, stealing passwords
D, hackers use IP address attack method: ( A )
A, IP deception
B, decryption
C, stealing passwords
D, hackers use IP address attack methods
D, sending viruses
16, "to enhance the sense of self-protection, do not arbitrarily dating Internet users", which shows that ( B )
A, in the Internet can not make friends
B, in the network should continue to improve their own discernment and awareness of the ability to
C, the network does not have any security
2022 National College Students Network Security Knowledge Contest Questions and Answers 2
1 、《中华人民****和国网络安全法》施行时间(2017年6月1日 )
2 、In order to safeguard cybersecurity, safeguard the sovereignty of cyberspace and national security, ________ , protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy development of economic and social informatization, the formulation of this law. ( social public **** interests )
3, "Network Security Law" provides that network operators should develop _______ , timely disposal of system vulnerabilities, computer viruses, network attacks, network intrusion and other security risks. ( Emergency Response Plan for Cybersecurity Incidents )
4 、The state supports cooperation among network operators in the areas of cybersecurity information ____ , ____ , ____ and ________ , so as to improve the security capacity of network operators. (Collection, analysis, notification, emergency response)
5. If a person violates the provisions of Article 27 of the Cybersecurity Law by engaging in activities that jeopardize cybersecurity, or by providing programs or tools specially designed for engaging in activities that jeopardize cybersecurity, or by providing technical support, advertising, promotion, or payment and settlement for others engaging in activities that jeopardize cybersecurity, and if such violation does not constitute a crime, he or she shall be subject to the confiscation of the illegal proceeds by the public security organs, and shall be sentenced to detention for not more than __ days, and to imprisonment for not more than __ days. The public security organ shall confiscate the illegal proceeds, impose a detention of not more than ___ days, and may also impose a fine of not more than ___ and not more than ___. ( five days 50,000 yuan 500,000 yuan )
6, violation of the provisions of Article 22, paragraph 3, Articles 41 to 43 of this Law, infringement of the right of personal information to be protected in accordance with the law, the competent authorities shall order rectification, and depending on the circumstances of the case, single or concurrently with warnings, confiscation of the illegal income, the illegal income of ______ more than ______ the following fine, there is no illegal income. ( one times ten times 1 million yuan 10,000 yuan 100,000 yuan )
7, in violation of the provisions of Article 44 of this Law, stealing or other illegal ways to obtain, illegally sell or illegally provide personal information to others, does not constitute a crime, the public security organs confiscate the illegal income, and impose the illegal income of ______ more than ______ the following fine, there is no illegal income, a fine of ______. The public security organs shall confiscate the illegal income and impose a fine of more than and less than on anyone who does not have illegal income. ( one times ten times one million yuan )
8 , network operators should provide technical support and assistance to _______ , the national security organs in accordance with the law to maintain national security and the investigation of crime activities. ( public security organs )
9, the state ______ is responsible for the overall coordination of network security work and related supervision and management work. ( Netcom department )
10, critical information infrastructure operators to purchase network products and services that may affect the ________ should be through the national Netcom department in conjunction with the relevant departments of the State Council to organize the national security review. ( national security )
11, critical information infrastructure operators should own or entrust the network security service organization _______ on the security of its network and the possible existence of risk detection and assessment. (At least once a year)
12, network operators in violation of the provisions of Article 47 of this Law, the laws and administrative regulations prohibit the publication or transmission of information without stopping the transmission, take elimination and other measures to dispose of, and save the relevant records, by the competent department shall order correction, give a warning, confiscate the illegal income; refusal to make corrections or the circumstances are serious, impose a fine of _______, and may order the suspension of the relevant business, suspension and reorganization of the business. Suspension of relevant business, suspension of business rectification, closure of website, revocation of relevant business permit or revocation of business license, and impose a fine of 10,000 yuan or more than 100,000 yuan on the directly responsible supervisors and other directly responsible persons. (100,000 yuan or more than 500,000 yuan or less)
13, network operators in violation of the provisions of the first paragraph of Article 24 of this Law, did not require users to provide real identity information, or to provide relevant services to users who do not provide real identity information, the competent authorities shall order correction; refusal to make corrections or the circumstances are serious, impose a fine of _____, and may be ordered by the competent authorities to suspend the relevant business, suspension, reorganization, closure of the site, revocation of the relevant business license or revocation of the business license. business, suspend business rectification, close the website, revoke the relevant business permit or revoke the business license, and impose a fine of 10,000 yuan or more than 100,000 yuan on the directly responsible person in charge and other directly responsible persons. (100,000 yuan or more than 500,000 yuan or less)
14 , the following about "network information security" statement is correct _______ . (Network operators should collect user information strictly confidential, network operators shall not disclose, tamper with, or destroy the personal information it collects)
15, the construction of critical information infrastructure should ensure that it has to support business stability, continuous operation of the performance, and to ensure that the security technology measures ________. (Simultaneous planning, construction, and security measures.)
15, the construction of critical information infrastructure should ensure that it has to support business stability, continuous operation of the performance, and to ensure that security technology measures ________. (synchronized planning, synchronized construction, synchronized use)
16, the state takes measures to ________ source of the Chinese people **** and network security risks and threats within and outside the country, to protect the critical information infrastructure from attacks, intrusion, interference and destruction. ABC (monitoring, defense, disposal)
17, due to network security incidents, emergencies or production safety accidents, should be disposed of in accordance with _______ and other relevant laws and administrative regulations. ("Chinese People's *** and State Emergency Response Law", "Chinese People's *** and State Safety Production Law"
18, cybersecurity incident emergency response plan should be in accordance with the event after the occurrence of ________, ________ and other factors on the classification of cybersecurity incidents. (Degree of harm, scope of influence )
19, network operators should formulate emergency response plans for network security incidents, and timely disposal of ______ and other security risks; in the event of an incident that jeopardizes network security, immediately activate the emergency response plan, take appropriate remedial measures, and report to the relevant competent authorities in accordance with the provisions of the report. (Computer viruses, network attacks, network intrusion, system vulnerabilities)
20, the state to promote the construction of network security socialized service system, encouraging the relevant enterprises and institutions to carry out network security ______ and other security services. (Certification, risk assessment, testing)
21 、Any individual and organization has the right to report to ______ and other departments on acts that endanger network security. (Internet information, telecommunications, public security)
22, we should repair computer operating systems and software vulnerabilities in a timely manner, because (vulnerability is a computer system or software system defects, viruses and malware can take advantage of this defect)
23, wireless networks There are huge security risks. For example, in the public **** place hackers to provide a free Wi-Fi access points similar to the name of the business, and to attract Internet users to access, and Internet users in the case of uninformed, may be faced with personal sensitive information was stolen, and even cause direct economic loss. This means is known as (Wi-Fi phishing traps)
24, Trojan horse program generally refers to hidden in the user's computer with a malicious nature (remote control software)
25, February 27, 2014, presided over the first meeting of the Central Leading Group on Cybersecurity and Informatization and delivered an important speech. He emphasized that _______ and _____ are major strategic issues related to national security and national development, as well as the working lives of the general public. (Cybersecurity, informatization)
26, Why do we need to change all kinds of passwords for computers, mailboxes and websites regularly in our daily lives and work? (Ensure the security of personal data and privacy)
27, according to the "Internet Electronic Bulletin Service Management Regulations", no one shall publish obscene, pornographic, gambling, violent, terrorist and other illegal and harmful information in electronic bulletin board (BBS), electronic whiteboard, electronic forums, _______, message boards and other electronic bulletin service systems on the Internet. (Internet chat rooms)
28, "the Chinese people's *** and the State Network Security Law" provides that the establishment of websites for the implementation of illegal and criminal activities, communication groups, or the use of the network to publish information related to the implementation of illegal and criminal activities, does not constitute a crime, by the public security organs shall be sentenced to less than five days of detention, and may be sentenced to 10,000 yuan of more than 100,000 yuan of fines; the circumstances of the more severe, shall be sentenced to more than five days of more than fifteen days of detention, and may be sentenced to a fine of more than 100,000 yuan of more than five days. Detention for less than fifteen days, and may also impose _______ a fine of more than five hundred thousand yuan, and close down websites and communication groups used to carry out illegal and criminal activities. ( 50000 )
29 , network operators should formulate network security incident contingency plans, timely disposal ( ) and other security risks; in the event of events that jeopardize network security, immediately start the emergency response plan, take appropriate remedial measures, and in accordance with the provisions of the report to the relevant competent authorities. (system vulnerabilities, computer viruses, network attacks, network intrusion)
30 , in order to defend the network eavesdropping, the most commonly used method is _______ (information encryption)
31 , the types of network attacks _______ (physical attacks, syntactic attacks, semantic attacks)
32 , network-based knowledge civilization people are concerned with the main Security is _______ (information security)
33, network service providers and other enterprises and institutions and their staff on the business activities of the collection of citizens' personal electronic information must be kept strictly confidential, _______ (shall not be leaked, tampered with, destroyed, and shall not be sold or provided to others illegally.)
34 , citizens found that the disclosure of personal identity, dissemination of personal privacy and other violations of their legitimate rights and interests of the network information, or by commercial electronic information intrusion, _______ (the right to request network service providers to delete the information or take other necessary measures to stop).
35, the state of the operating Internet information services to implement the licensing system; non-operating Internet information services to implement the record-keeping system. _______ (without obtaining a license or not fulfill the record procedures, shall not engage in Internet information services.)
36, engaged in news, publishing, education, health care, medicines and medical devices and other Internet information services, in accordance with the laws, administrative regulations and the relevant provisions of the state shall be subject to the competent authorities to review and agree to _______ (in the application for operating licenses or to fulfill the filing procedures, should be in accordance with the law by the competent authorities to review and agree to)
37, _______ , dereliction of duty, abuse of power, favoritism, negligence in the supervision and management of Internet information services, resulting in serious consequences, constituting a crime, shall be investigated for criminal responsibility; not yet constituting a crime, the directly responsible officer in charge and other directly responsible personnel shall be given a demotion, dismissal until dismissal of the administrative sanctions. (Telecommunications regulatory bodies and other relevant authorities and their staff)
38, production, copying, publishing, dissemination of "Internet Information Service Management Measures," one of the contents listed in Article 15 of the information, constituting a crime, shall be held criminally responsible; does not constitute a crime, by the public security organs, the state security organs in accordance with the "Chinese People's Republic of China *** and the State Public Security Administration Punishment Law," the "Computer Information Network International Networking Security Protection Administration". Measures for the Administration of Security Protection of the International Networking of Computer Information Networks" and other relevant laws and administrative regulations shall be punished; _______ (for operational Internet information service providers, and by the licensing authority ordered to suspend business rectification until the revocation of the business license to notify the business registration authority; non-operational Internet information service providers, and by the filing authority to order the temporary closure of the site until the closure of the site.)
39, Internet users public account information service providers should implement the main responsibility for the management of information content security, equipped with the scale of services commensurate with the professional and technical capabilities, the establishment of chief editors and other information content security responsible person positions, to establish and improve and so on management system. (user registration, information review, emergency response, security)
40, obtained in accordance with the law Internet news and information service providers, can be opened through the user public account editorial release of news and information. (Internet news information collection and distribution qualification)
41, Internet user public account information service users should fulfill the responsibility to comply with the management of news and information, intellectual property protection, network security protection and other laws and regulations and the relevant provisions of the State, to maintain the order of network communication. (Information dissemination and operation safety management)
42, data message explanation: (refers to electronic, optical, magnetic or similar means of generating, sending, receiving or storing information)
43, electronic signature explanation: (refers to the electronic form of the data message contained in the data attached to the identification of the signatory identity and indicate that the signatory recognizes the content of the data)
44, meet the conditions of the data message: (refers to the electronic form of the signatory identity and indicate that the signatory recognizes the contents of the data)
44, meet the conditions of the data message, deemed to meet the laws and regulations of the original form requirements. ( 1, can effectively express the content and can be accessed at any time to check; 2, can reliably ensure that since the final formation, the content remains intact, has not been changed.)
45, meet the conditions of the data message, deemed to meet the laws and regulations of the document preservation requirements. (1, can effectively show the content and can be accessed at any time to check; 2, the format of the data message and its generation, send or receive the same format, or format is not the same but can accurately show the original generation, send or receive the content; 3, can identify the sender of the data message, the recipient and the time to send, receive)
46, review of the authenticity of data messages as evidence, what factors should be taken into account. The authenticity of data messages as evidence, what factors should be considered. (1, the generation, storage or transmission of data message method of reliability; 2, to maintain the integrity of the content of the method of reliability; 3, used to identify the sender of the method of reliability; 4, other relevant factors)
47, the data message, what circumstances, deemed to be sent by the sender: (three cases of a can be deemed to be the sender to send 1, by the authorization of the sender; 2, the sender's information system automatically sent; 3, the sender's information system automatically sent; 3, the sender's information system automatically sent; 3, the sender's information system automatically sent; 3, the sender's information system automatically sent. Information system automatically sent; 3, the addressee in accordance with the method recognized by the sender of the data message to verify the results of the match)
48, electronic signatures at the same time to meet the conditions of what is regarded as a reliable electronic signature: (1, the electronic signature production data used for the electronic signature, belonging to the electronic signatory proprietary; 2, the electronic signature production data when signing the electronic signature is only under the control of the electronic signatory; 3, After signing any changes to the electronic signature can be found; 4, after signing any changes to the content and form of the data message can be found)
49, electronic signatures to the electronic authentication service provider to apply for an electronic signature authentication certificate, the information should be provided (true, complete and accurate)
50, electronic authentication service providers should be properly preserved and authentication-related information, information retention period of at least one year for the electronic signature authentication certificate. (five years)
51, electronic signatures, constituting a crime, shall be investigated for criminal liability; cause losses to others, shall bear civil liability. (Counterfeiting, fraudulent use, theft of others)
52 , network explanation: (is composed of computers or other information terminals and related equipment in accordance with certain rules and procedures for the collection, storage, transmission, exchange, processing of information system)
53 , network security explanation: (refers to the network security through the adoption of necessary measures to guard against attacks on the network, invasive, interference, sabotage, and illegal use and accidents, so that the network can be used for the purpose of security. illegal use and accidents, so that the network is in a stable and reliable state of operation, as well as to protect the integrity of network data, confidentiality, availability of the ability to )
54, network operator explained: (refers to the network owner, manager and network service providers)
55, network data explained: (refers to the network through the collection, storage, transmission, processing, and generation of a variety of electronic data)
56, network security explained: (refers to the network collection, storage, transmission, processing and generation of (refers to all kinds of electronic data collected, stored, transmitted, processed and generated through the network)
56, personal information explanation: (refers to electronic or other means of recording the ability to individually or in combination with other information to identify a natural person's personal identity of all kinds of information, including, but not limited to, the name of the natural person, the date of birth, identity document number, personal biometric information, address, telephone number, etc.)
57, microblogging Explanation: (refers to the social network services based on the user attention mechanism, mainly in the form of short text, pictures, videos and other forms of information dissemination and access.)
58, microblogging service providers should play a positive role in promoting economic development and serving the public, promote socialist core values, disseminate advanced culture, adhere to the correct orientation of public opinion, and advocate the Internet. (Legal Internet, civilized Internet, safe Internet)
59, microblogging service providers should obtain the relevant qualifications prescribed by laws and regulations. Provide Internet news and information services to the public, should be obtained in accordance with the law of the license, and within the scope of the license to carry out services, prohibit unauthorized or beyond the scope of the license to carry out service activities. (Internet news information service license)
60, microblogging service providers should be in accordance with the principle of microblogging service users based on the organization code, identity document number, mobile phone number and other means of authentication of real identity information certification, regular verification. Microblog service users do not provide real identity information, microblog service providers shall not provide information dissemination services. (background real name, front voluntary)
61, microblogging service providers should record microblogging service user log information, preserved for a period of time of not less than one month. (six months)
62, microblogging service providers should establish and improve the mechanism, microblogging service users are found to publish, disseminate rumors or false information, should take the initiative to take measures. (Rumor mechanism)
63, the Internet information content management department to implement administrative law enforcement, should follow the
Principles, so that the facts are clear, the evidence is solid, the procedures are legal, the application of laws and regulations are accurate and appropriate, the use of law enforcement instruments. (Open, fair and impartial)
64, Internet information content management department for the Internet information content involving illegal places, objects, networks should be . (Surveying, inspection, timely collection and fixation of documentary evidence, physical evidence, audio-visual materials and electronic data)
65, the Internet information content management department for the investigation of the case, there is evidence to prove that the facts of violation of the law is established, should be issued to order correction notice, order the parties to behavior. (Correction or deadline to correct the illegal)
66, to provide Internet news and information services, should comply with the Constitution, laws and administrative regulations, adhere to the direction of the direction, adhere to the correct guidance of public opinion, play the role of public opinion supervision, and promote the formation of a positive and healthy, upwardly mobile network culture, and safeguard the interests of the State and the interests of the public ****. (Serving the people, serving socialism)
67, Internet news and information service providers should be separated from the editorial and operational business, shall not be involved in the Internet news and information editorial business. (Non-public capital)
68, Internet news and information service providers should be sound and other information security management
system, with safe and controllable technical safeguards. (information release audit, public **** information inspection, emergency response)
69, domain name registration services In principle, the implementation of the corresponding domain name registration rules otherwise
Provide, from its provisions. ("first application first registration")
70, the domain name registration service organization shall not be used and other improper means to require others to register
domain name. (Fraud, coercion)
71, the domain name registration service organization shall publish the domain name registration services, to ensure the quality of service
, to provide domain name registration information public **** query service. (Content, time limit, cost)
72, domain name registration authority, domain name registration services should be in accordance with the user's personal information. Without the consent of the user shall not provide the user's personal information to others, but laws and administrative regulations provide otherwise. (Storage, protection)
73, the provision of domain name resolution services, should comply with the relevant, with the appropriate technology, services and network and information security capabilities, the implementation of network and information security measures, according to the law, record and retain the domain name resolution logs, maintenance logs and change records, to ensure that the resolution of the quality of service and the resolution of the system security. Involving the operation of telecommunications business, it shall obtain a license for the operation of telecommunications business in accordance with the law. (Laws, regulations, standards)
74, the Internet group explanation: (refers to Internet users through Internet sites, mobile Internet applications, etc., established for the group online exchange of information in cyberspace)
75, the Internet group information service provider explanation: (refers to the provision of Internet group information services platform. Internet group information service users referred to in this provision, including group builders, managers and members).
76, Internet group information service providers and users, should adhere to the correct orientation, promote the network culture, and maintain a good network ecology. (Socialist core values, cultivate positive and healthy)
77, Internet group information service providers shall violate laws and regulations and the relevant provisions of the State Internet group, in accordance with the law and take such measures as disposal, preservation of relevant records, and report to the competent authorities. (warning rectification, suspension of publication, closure of the group)
78, Internet group information service providers should be required to retain network logs for not less than a month. (six)
79, Internet group information service providers shall establish a blacklist management system, the seriousness of the violation of laws and regulations of the group and Inclusion of blacklisting, restriction of group service functions, keep relevant records, and report to the relevant competent authorities. (Establishers, managers and members)
80 , Internet group information service providers shall violate laws and regulations and the relevant provisions of the state group establishers, managers and other users, in accordance with the law and take management measures, such as preserving the relevant records, and report to the relevant competent authorities. (Reduce credit rating, suspend management privileges, cancel the qualification of building groups)
81, computer virus prevention measures include (management, technology, security awareness)
82, the biggest threat to information security is (people, especially insiders)
83, in the unit of the local area network (LAN), why standardize the name of the individual terminal computer? (Enhance management efficiency, timely localization after the emergence of problems).
84 , is as an information system (including computers, cell phones, etc.) should be the responsibility of ordinary users. (Setting sufficiently complex passwords (passwords) and timely change)
85, the criminal law: violation of state regulations, intrusion into state affairs, national defense construction, cutting-edge scientific and technological fields of computer information systems, shall be sentenced to fixed-term imprisonment or detention. (less than three years)
86, China's establishment of online virtual community policing system, the implementation of hourly online patrol. ( 24 )
87, violation of state regulations, for the purpose of profit, through the information network for compensation to provide services to delete information, or knowingly false information, through the information network for compensation to provide services such as publishing information, disturbing the market order, the individual illegal business amount of more than 10,000 yuan, or the amount of illegal proceeds of more than yuan; unit illegal business amount of more than 10,000 yuan, or the amount of illegal proceeds of more than 10,000 yuan. The amount of illegal operation of a unit is more than ten thousand yuan, or the amount of illegal income is more than ten thousand yuan. Illegal business activities are "serious circumstances", in accordance with the provisions of Article 225 (4) of the Criminal Law, convicted and punished as illegal business crimes. (V, II, XV, V)
88, it is strictly prohibited to store information in the computer hard disk. (Classified)
89, computer virus transmission channels include. (removable storage devices, hard disk, CD-ROM, network)
90, such as network slowdown, the possible reasons are (viruses, network equipment problems, network bandwidth is not enough, too many users)
91, the use of the "backup" program is the purpose of the (to make the existence of the computer files safer, to avoid the loss of files due to hard disk error, etc.)
92, Is the use of computers, networks and communications and other modern information technology means to achieve the optimization and reorganization of government organizational structure and workflow. (e-government)
93, network attacks on the broiler refers to (controlled puppet computer)
94, cybercrime manifestations are common. (illegal intrusion, destruction of computer information systems, Internet gambling, Internet theft, Internet fraud and Internet pornography).
95, network bad information, the most serious impact is . (Internet rumors).
96 , is the first element of emergency management of online public opinion. (Time)
97 、Nowadays, the world's four major media are newspapers, radio, television and (Internet).
98 , in the Internet environment, the formation of online public opinion has become more complex, but roughly follow (generate topics, topics continue to survive, the formation of online public opinion, the development of online public opinion, online public opinion quell mode).
99 , the perpetrator intentionally creates and publishes harmful, false, outdated and useless undesirable information to become . (information pollution).
100, the harm of the network bad information is mainly manifested in . (endangering national security, disrupting social order, inducing the occurrence of criminal behavior, causing huge economic losses).
2022 National College Students Network Security Knowledge Contest Questions and Answers Related Articles :
★ National College Students Network Security Knowledge Contest Question Bank (with answers)
★ National College Students Network Security Knowledge Contest Questions and Answers
★ National college students network security knowledge contest questions and answers
★ National college students network security knowledge contest question bank and answer book
★ Network security knowledge contest questions and answers1
★ College students security knowledge contest questions and answers
★ Network security knowledge contest answers
★ College students safety knowledge contest questions and Answers
★ College safety contest questions and answers
★ National Cyber Security Awareness Week knowledge contest questions and answers
var _hmt = _hmt || []; (function() { var hm = document.createElement("script"); hm.src = " /hm.js?fff14745aca9358ff875ff9aca1296b3"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s); })();