The quiz on network security knowledge 1 makes the network server full of information that needs to be replied, consumes bandwidth, and causes the network or system to stop normal service. What kind of attack does this belong to? (1)
A. denial of service
B, file sharing
C. Binding vulnerabilities
D, remote procedure call
2, in order to defend against network monitoring, the most commonly used method is (b)
First, the use of physical transmission (non-network)
B, information encryption
C. wireless network
D, using dedicated line transmission
3. What kind of attack means is to input an extremely long string in a limited space? (1)
A, buffer overflow;
B, network monitoring
C. denial of service
D.IP spoofing
4. The protocol mainly used for encryption mechanism is (D)
A: HTTP
b、FTP
remote login
d、SSL
5. The user receives a suspicious email, asking the user to provide the bank account and password. What kind of attack is this? (2)
A, cache overflow attack;
B, fishing attacks
C, secret door attack;
D.DDOS attack
6, Windows NT and Windows 2000 systems can be set to lock the account after multiple invalid logins, which can prevent (b)
A, trojan horse;
B, violent attacks;
C.IP spoofing;
D, cache overflow attack
7. Among the following authentication methods, the most commonly used authentication method is: (a)
Authentication based on account name/password
B. authentication based on abstract algorithm;
Authentication based on PKI;
Database-based authentication
8. Which of the following is not a measure to prevent guessing passwords? (2)
A. Strictly limit the number of illegal authentications from a given terminal;
B, ensuring that the password is not copied on the terminal;
C, prevent users from using too short passwords;
D, use the password generated by the machine
9, the following does not belong to the system security technology is (b)
A. firewall
B, encryption dog
C. prove
D, anti-virus
10, measures against mail intrusion, which is incorrect (d).
Don't use birthday as a password.
B. Don't use passwords with less than 5 digits.
C, don't use pure numbers
D, be your own server
1 1, which is not a common dangerous password is (d).
A, the same password as the user name
B, use birthday as a password
C, only 4 digits password
D, 10 bit comprehensive password
12, which does not belong to the computer virus prevention strategy is (d)
Make sure you always have a really "clean" startup disk.
Upgrade anti-virus products timely and reliably.
C, the newly bought computer software should also be tested for viruses.
D, sorting disks
13. The firewall technology introduced for the shortcomings of packet filtering and application gateway technology is the characteristic of ((d)) firewall.
A, bag filter type
B. Application-level gateway type
C, composite firewall
D, agency service
14, disconnecting the terminal at the end of using the computer at 5 pm every day belongs to (a)
A. Physical security of external terminals
B, the physical security of communication lines
C, eavesdropping data
D, network address spoofing
15, what was the most influential computer and network virus in the first half of 2003 (b)
Severe acute respiratory syndrome
(B)SQL killer worm
(3) Mobile phone virus
(d) globular virus
16, what are the characteristics of the SQL killer worm attack (1)
(a) consuming a lot of network bandwidth
(b) Attacking personal computer terminals
(c) Disrupting computer game programs.
(d) Attacking mobile phone networks
17, IT development and security investment, security awareness and security means (b)
(A) security risk barriers
(b) security risk gap
(C) changes in management style
(d) managing gaps
18, the increase of computer crime rate in China is (c).
10%
160%
60%
300%
19, information security risk gap refers to (a)
(A) the imbalance between IT development and security investment, security awareness and security means
(2) loopholes caused by insufficient information in informatization.
(c) loopholes in the operation and maintenance of computer networks
(d) calculate the fire risk of the center.
20, the first information network security era (b)
1mid-1990s
(b)1before the mid-1990s
At the turn of the century
(D) the era of private networks
2 1, the third information network security era (1)
(A) mainframe era, private network era and multi-network integration era
(2) mainframe era, personal computer era and network era.
(c) The personal computer age, the network age and the information age.
(D)200 1,2002,2003
22, the second information network security era (a)
(A) the era of private networks
(b)1before the mid-1990s
At the turn of the century
23. The fragility of network security in the era of multi-network convergence is reflected in (c).
(a) Network vulnerability
(b) Vulnerability of software
(c) Vulnerability of management
(d) Vulnerability of applications
24, people's highest dependence on the Internet era (C)
(A) the era of private networks
Personal computer era
(C) the era of multi-network convergence
(D) Mainframe era
25, network attack and defense is in an asymmetric state because (C)
(a) Vulnerability of management
(b) Vulnerability of applications
Complexity of network software and hardware
(d) Vulnerability of software
26, the types of network attacks (a)
(A) personal attacks, grammatical attacks and semantic attacks
(2) Hacker attacks and virus attacks
(C) hardware attacks, software attacks
(d) Physical attacks, hacker attacks and virus attacks.
27. Semantic attacks use (a)
(A) the meaning of information content
(b) Virus attacks on software
(c) Hacker attacks on the system
Hackers and virus attacks
28, 1995 after the information network security problem is (a).
risk management
(b) Access control
Eliminate risks
avoid risks
29, the three elements of risk assessment (D)
Policy, structure and technology
(b) Organization, technology and information
(c) Hardware, software and personnel
(d) Assets, threats and vulnerabilities
30, information network security (risk) assessment method (a)
(A) the combination of qualitative evaluation and quantitative evaluation
Qualitative evaluation
Quantitative evaluation
(d) site assessment
3 1, the main difference between PDR model and access control (a)
(A)PDR regards the object of guarantee as a whole.
(B)PDR is the first line of defense for system protection.
(C)PDR combines qualitative evaluation with quantitative evaluation.
The key factor of PDR is people.
32. The key factor of PDR model in information security is (a)
(1) People
technology
model
target
33, computer network first appeared in which era (B)
The 1950s
The 1960s
1980s
1990s
34. What was the purpose of the earliest study of computer networks? (3)
Direct personal communication;
(b) Sharing hard disk space, printers and other equipment;
(c) sharing computing resources;
A lot of data exchange.
35. What is the biggest difference between the earliest computer network and the traditional communication network? (2)
(a) The bandwidth and speed of computer networks have been greatly improved.
(b) The computer network adopts packet switching technology.
(c) Computer networks adopt circuit-switched technology.
(d) The reliability of computer networks has been greatly improved.
On the next page, there is more about the "question and answer of network security knowledge contest".