Network security knowledge contest questions 20 17(3)

47. Wang likes to log in and register on different shopping and social networking sites, but he is used to using the same user name and password to log in to different websites. One day, he suddenly found that his accounts in Weibo and many websites could not be logged in at the same time, and these websites used the same user name and password. Excuse me, which of the following behavioral attacks may Wang have suffered: ().

First, drag the library

B, go to the library

C, establishing a database

D, cleaning the library

48. It is easy to process and store information involving state secrets and enterprise secrets on networked computers.

Yes

B, it is strictly prohibited

C, uncertainty

D, as long as the network environment is safe, you can.

49. (Easy) Important data should be timely () to prevent data loss due to unexpected circumstances.

First, antivirus

B, encryption

C, backup

D, formatting

50. (Simple) Which of the following passwords is the most secure ()

A. Integrity 6548+023455636365

B, ah @7es6RFE,,,d 195ds@@SDa

c、passW@odassW@odassW@od

d、ichunqiuadmin 123456

5 1. (Easy) The protocol mainly used for communication encryption mechanism is ().

A: HTTP

b、FTP

remote login

d、SSL

52. (Easy) In the process of network access, in order to defend against network monitoring, the most commonly used method is ()

First, the use of physical transmission (non-network)

B, encrypted information transmission.

C, network camouflage

D. network suppression.

53. (in) belong to the operating system itself security vulnerabilities are: ().

A, the "back door" of the operating system itself

B, QQ Trojan virus

C, administrator account set weak password.

The firewall in the computer has not made any access restrictions.

54. (in) Windows operating system to complete the registry operation tools are: ().

a、syskey

b、msconfig

c、ipconfig

D, registry editing

55. (Middle) Use different keys for encryption and decryption. This encryption algorithm is called ().

A, symmetric encryption algorithm

B, asymmetric encryption algorithm

c、MD5

D, hash algorithm

56. (Yi) There is a Trojan horse program, which mainly records the keystrokes of the keyboard when the user is operating the computer and sends them to the controller's mailbox by email. This Trojan horse program belongs to: ().

I. Types of destructiveness

B. Password sending type

C, remote access type

D, keyboard record type

57. (Yi) What is the correct statement about brute force password cracking? ( )

A, that is, try all the permutations and combinations of passwords with a computer until you find the correct password.

B, it means to invade the user's system through a Trojan horse and then steal the user's password.

C, refers to the intruder through e-mail cajoling and other methods, let the attacker provide the password.

D, through the threat of violence, let the user take the initiative to disclose the password.

58. (C) Which of the following statements is incorrect about the main attack means of hackers? ( )

First, including social engineering attacks

B, including violent cracking attacks

C, direct infiltration attack

D, don't steal system data

59. (Middle) Suppose an encryption algorithm is used, and its encryption method is simple: add 5 to each letter, that is, encrypt A into F. The key of this algorithm is 5, so it belongs to ().

First, symmetric encryption technology

B, block cipher technology

C, public key encryption technology

D, one-way function cryptography technology

60. (Simple) When using networks and computers, the most commonly used authentication methods are:

A. username/password authentication

B, fingerprint authentication

C, CA certification

D, dynamic password authentication

6 1. (middle) Many hackers take advantage of loopholes in systems and software to attack. What is the most effective solution? ( )

A, install a firewall

B, install the intrusion detection system

C. Install the latest patches for system and software updates.

D, install antivirus software.

62. (medium) mail bomb attacks mainly include ()

A, destroy the attacked mail server

B. Malicious use of junk data to fill the mailbox of the attacked person.

C. destroy the attacked mail client.

D. Guess the victim's email password.

63. (Simple) Network Scanning Tool ()

First, it can only be used as an attack tool

B, can only be used as a preventive tool.

C, can be used as both an attack tool and a prevention tool.

D, can't be used for network attacks.

64. (media) in the operating system _ _ file system to support encryption function ().

a、NTFS

b、FAT32

fat

EFS

65. (Simple) Users of a website need to enter a 4-digit verification code when logging in. Suppose there is no limit on the number of times the verification code is entered incorrectly on the website. If the verification message is cracked violently, how many times can it be cracked at most?

I. 1000 times

B, 10000 times

C, 1000000 times

D, 20,000 times

66. (Easy) Generally speaking, the antivirus software in personal computers can't defend against which of the following threats?

A. text virus

B.DDoS attacks

Email virus

D, Trojan horse

67. (Chinese) IPv6 is the next generation IP protocol designed by the Internet Engineering Task Force (IETF), and the address length adopted by IPv6 is _ _ _ _ _ _ _.

One, 256

b, 128

C, 64 bit

d,5 12

68. (Easy) In recent years, the security risks faced by e-mail users and companies have become increasingly serious. The following are not threats to e-mail security: _ _ _ _ _ _ _

First, SMTP security vulnerabilities

B, mass mailing

mail bomb

D. Spam

69. (Medium-sized) macro viruses are computer viruses registered in documents or template macros, and the following types of files will not be infected by macro viruses: _ _ _ _ _ _ _ _

doctor

b、xls

c、exe

d、ppt

70. (2) According to the Law on Guarding State Secrets, the period for keeping state secrets classified shall generally not exceed _ _ _ _ _ _ years:

One or fifty years

twenty years

C.for ten years

D, thirty years

7 1. (middle) Releases the IP address currently obtained by the computer. The command used is: _ _ _ _ _ _ _

A: ipconfig

b、ipconfig /all

C, ipconfig/ update

D. ipconfig/ release

72. (middle) The following statement about the description of Windows services is wrong: _ _ _ _ _ _ _

A.Windows services usually run as an administrator.

B it can be run as an independent process or attached to the svchost process in the form of a DLL.

C, in order to improve the security of the system, the administrator should try to shut down unnecessary system services.

D. Windows services can only run when users log in interactively.

73. (C) The following statements about risk are incorrect: _ _ _ _ _ _ _ _

First, the risk is objective

B, no measures can completely eliminate the risk.

C. Appropriate measures can be taken to completely eliminate risks.

D, risk refers to a possibility

74. (middle) If you want to prohibit QQ tools from networking through the firewall, which of the following settings should be modified in the Windows firewall: _ _ _ _ _ _ _ _

I. Inbound rules

B, outbound rules

C, connection safety rules

D, monitoring

75. (middle) When the guest user of Windows server logs on to the host, the user name is _ _ _ _ _ _ _ _.

A: Anonymous.

B, management

C, root

D, guests

76.(Easy) DHCP can be used to automatically allocate _ _ _ _ _ _ _ for each device.

A. Internet address of the Internet

B.mac address

C. Website

D. server name

77. The (moderate) webpage virus (also known as webpage malicious code) is a virus that uses webpages to destroy. It is malicious code written in some scripting languages. What do attackers usually use to implant web viruses: _ _ _ _ _ _ _ _

A. denial of service attacks

B, password attack

C. Platform vulnerabilities

D, u disk tool

78. (in) the data integrity mechanism can prevent the attack mode is _ _ _ _

A, spoofing attacks that forge source addresses or user addresses;

B. refusing to submit information;

C, the data is snooped by the attacker in the middle;

D. The data is tampered with or destroyed by the attacker on the way.

79. (Media) "Can't get in", "can't get out", "can't understand", "can't change" and "can't get out" are the purposes of network information security construction. Where "incomprehensible" refers to the following security services:

First, data encryption

B. Identity authentication

C, data integrity

D. access control

80. The (difficult) DES algorithm key is 64 bits, because some bits are used for checking, and the actual effective bit of the key is _ _ _ _ _ _ _ _.

A: 60

56 years old

c、54

Day 48

8 1. (Easy) Which of the following is based on a large integer that is difficult to decompose into two prime factors?

Answer: ECC

Second, RSA

c、DES

Duffy-Herman

Second, multiple choice questions

82. (2) In order to prevent and control spam, the commonly used methods are: ().

A. Avoid disclosing email address at will.

Back up your mail regularly.

C, with the help of special anti-spam software.

D. use mail management and filtering functions.

83. (Easy) Don't open webpages, e-mail links or attachments of unknown origin, because _ _ _ _.

First, the Internet is full of all kinds of phishing websites, viruses and Trojan horses.

B. Unknown web pages, email links and attachments are likely to hide a large number of viruses and Trojans.

C possible viruses and trojans will automatically enter the computer and hide in the computer, resulting in file loss and damage.

D possible viruses and trojans will automatically enter the computer and hide in the computer, resulting in system paralysis.