当前位置:网站首页>Network security detection and prevention test questions (4)
Network security detection and prevention test questions (4)
2022-06-25 18:55:00 【9JiuJiu】
problem 1
About personal biometric information , Which of the following is a reasonable treatment ( ).
A. Inform the collection purpose in the privacy policy text
B. Share personal biometric information with partners
C. Public disclosure of personal biometric information
D. Only the summary information of personal biometric information is retained
1 branch
problem 2
When selecting vulnerability assessment products, you should pay attention to ().
A. Whether there is a network 、 Host and database vulnerability detection function
B. Product scanning capability
C. Product vulnerability repair capability
D. All of the above are true
1 branch
problem 3
" Network vulnerability scanning system through remote detection ( )TCP/IP Services on different ports , Record the answers given by the goal ."
A. The source host
B. Router
C. The target host
D. None of the above
1 branch
problem 4
" Use the scanning method of vulnerability library matching , Can find ( )."
A. Unknown vulnerability
B. Known vulnerabilities
C. Vulnerabilities in self-designed Software
D. All the loopholes
1 branch
problem 5
( ) A system is a program that automatically detects security weaknesses in a remote or local host .
A. Intrusion detection
B. A firewall
C. Vulnerability scanning
D. Intrusion Prevention
1 branch
problem 6
The following description of computer vulnerabilities is wrong ( ).
A. Loopholes can be fixed
B. As long as the design is rigorous, there will be no loopholes
C. No system can avoid vulnerabilities
D. Vulnerabilities are easy to be discovered and exploited by hackers
1 branch
problem 7
In biometric authentication , What is not appropriate as a certification feature is ( ).
A. The fingerprint
B. iris
C. Face portrait
D. weight
1 branch
problem 8
Network vulnerability scanning can ().
A. Discover the target host or network
B. Determine the type of operating system
C. Confirm that the port is open
D. Test the system for security vulnerabilities
1 branch
problem 9
The following statement about user password is wrong ( )
A. Password cannot be set to null
B. The longer the password length , The more secure
C. Complex password security is high enough , There is no need to modify it regularly
D. Password authentication is the most common authentication mechanism
1 branch
problem 10
Register users online , When setting the user password, you should ( ).
A. Involving property 、 The password of payment account shall be high-strength password
B. Set up 123456 Easy to remember numbers 、 Letters are passwords
C. All accounts are passwords , Easy to use
D. Use your or your parents' birthdays as passwords
1 branch
problem 11
stay Windows Operating system , The password of the account is generally in ( ) Form preservation .
A. Plaintext
B. Encrypted ciphertext
C. Message after digital signature
D. Hash value after hash transformation
1 branch
problem 12
Windows The security log of the operating system passes ( ) Set up .
A. Event viewer
B. Service Manager
C. Local security policy
D. network adapter
1 branch
problem 13
When a user logs in to the host anonymously , The user is called ( ).
A.Guest
B.OK
C.Admin
D.Anonymous
1 branch
problem 14
( ) No Windows Share access to .
A. read-only
B. Complete control of
C. change
D. Read and execute
1 branch
problem 15
stay Windows Operating system , Be similar to “S-1-5-21-839522115-1060284298-85424-5398-500” The value of represents ().
A.DN
B.UPN
C.SID
D.GUID
1 branch
problem 16
The following are not UNIX/Linux The password setting principle of the operating system is ( ).
A. The password should be in English letters 、 Numbers 、 Punctuation 、 Control the combination of characters, etc
"B. Don't use English words , Vulnerable to dictionary attacks "
C. Don't use yourself 、 family 、 Pet's name
D. Be sure to choose a character length of 8 Bit string as password
1 branch
problem 17
"Windows NT and Windows 2000 The system can be set to lock the account after several invalid logins , This prevents ()"
A. Trojan horse
B. Violent attack
C.IP cheating
D. Cache overflow attack
1 branch
problem 18
The process by which an illegal recipient attempts to analyze plaintext after intercepting a ciphertext is called ()
A. Decipher
B. Decrypt
C. encryption
D. attack
1 branch
problem 19
Which of the following methods cannot prevent password attacks ( ).
A. Enable firewall function
B. Set complex system authentication password
C. Turn off unwanted network services
D. Modify the system default authentication name
1 branch
problem 20
Windows Operating system usage () Perform security management on user accounts .
A.RAM
B.ROM
C.SAM
D.Cache
1 branch
problem 21
The administrator sets the system login password as simple “123456”, Which of the following security vulnerabilities is this ?( )
A. System FLAW
B. Application Service Vulnerability
C. Information leak vulnerability
D. Weak password vulnerability
1 branch
problem 22
The best rule to follow when creating a password is ( ) .
A. Use English words
B. Choose a password that is easy to remember
C. Use the names of yourself and your family
D. Try to choose a long password
1 branch
problem 23
The attack method of guessing the system interface by trying all possible character combinations used by the system is called ().
A. Back door attack
B. Violent attack
C. out of buffer
D. Man-in-the-middle attack
1 branch
problem 24
Which of the following attacks is most commonly used to crack passwords ?( )
A. To cajole ( spoofing)
B. Dictionary attack (dictionary attack)
C. Denial of service (DoS)
D.WinNuk
1 branch
problem 25
Network monitoring is ( ).
A. Remotely observe a user's computer
B. Monitor the status of the network 、 Transmitted data stream
C. monitor PC Operating condition
D. Monitor the development direction of a website
1 branch
problem 26
If a computer in the LAN is affected by ARP cheating , So the packets it sends out ,( ) It's wrong. .
A. Source IP Address
B. Purpose IP Address
C. Source MAC Address
D. Purpose MAC Address
1 branch
problem 27
stay Windows Operating system , To gateway IP Address and MAC The operation command for binding addresses is ().
A. arp -a 192.168.0.1 00-0a-03-aa-5d-ff
B. arp -d 192.168.0.1 00-0a-03-aa-5d-ff
C. arp -s 192.168.0.1 00-0a-03-aa-5d-ff
D. arp -g 192.168.0.1 00-0a-03-aa-5d-ff
1 branch
problem 28
When a user visits a legitimate website through a domain name , What I opened was an unhealthy website , The reason for this phenomenon may be ( ).
A. ARP cheating
B. DHCP cheating
C.TCP SYN attack
D.DNS Cache poisoning
1 branch
problem 29
" Defense network monitoring , The most common method is ( )."
A. Using physical transmission ( Non network )
B. Information encryption
C. Wireless network
D. Using private line transmission
1 branch
problem 30
ARP The agreement is to ( ) Address converted to ( ) The agreement .
A.IP、 port
B.IP、MAC
C.MAC、IP
D.MAC、 port
1 branch
problem 31
Man-in-the-middle attack , abbreviation MITM, namely ().
A. Replay attack
B. Denial of service attacks
C. Man-in-the-middle attack
D. Backdoor vulnerability attack
1 branch
problem 32
" About DHCP Deceptive attack , Which of the following descriptions is wrong ?( )"
A. Sent by the terminal DHCP Discovery messages reach all DHCP The server
B. Terminal cannot be identified DHCP Provide the identity of the message sender
C. The terminal cannot distinguish DHCP Correctness of network information in the server
D. Ethernet cannot prevent counterfeiting DHCP The server provides network information configuration services
1 branch
problem 33
ARP The essence of deception is ( )
A. Provide virtual MAC And IP The combination of addresses
B. Let other computers know that they exist
C. Steal data transmitted by users in the network
D. Disrupt the normal operation of the network
1 branch
problem 34
When carrying out network attack and identity hiding , Which of the following network information should not be cheated or embezzled ?( )
A.MAC Address
B.IP Address
C. Mail account
D. None of the above
1 branch
problem 35
Eavesdropping is a kind of () attack , The attacker () Insert your own system between the sending station and the receiving station . Interception is a kind of () attack , The attacker () Insert your own system between the sending station and the receiving station .
"A. passive , need not , Take the initiative , must "
"B. Take the initiative , must , passive , need not "
"C. Take the initiative , need not , passive , must "
"D. passive , must , Take the initiative , need not "
1 branch
problem 36
Internet eavesdropping (Sniffer) It can capture the sensitive information flowing through the network , The following statement is wrong ()
A. After the password is encrypted , Will not be bugged
B.Cookie Fields can be bugged
C. Messages and frames can be bugged
D. Advanced eavesdroppers can also ARPSpoof, Man-in-the-middle attack
1 branch
problem 37
Hackers use IP Address attack methods are ( )
A.IP cheating
B. Decrypt
C. Steal the password
D. Send the virus
1 branch
problem 38
Which of the following is the solution to ARP An effective method of spoofing attacks ()?
A. Static configuration for each terminal IP Address and MAC Binding relationship between addresses
B. Each terminal has any difference IP Address and MAC The ability of an address pair to be valid
C. Each terminal has ARP The ability to identify the message source
D. The switch establishes the terminal to which each port is connected IP Address and MAC The address of
1 branch
problem 39
In the following attacks , Which attack is not defensible by statically configured access control lists ()?
A.MAC Table overflow attack
B.MAC Address spoofing attack
C.DHCP Deceptive attack
D.ARP Deceptive attack
1 branch
problem 40
Network monitoring ( Sniffing ) This form of attack destroys which of the following ?( )
A. Non repudiation of network information
B. Confidentiality of network information
C. Availability of network services
D. Integrity of network information
1 branch
problem 41
() The protocol can be used to map the physical address of a computer to a temporarily specified network address .
A.ARP
B.SNMP
C.DHCP
D..FTP
1 branch
problem 42
Suppose you send a specific packet to a remote host , But you don't want the remote host to respond to your packets . What type of attack do you use ? ( )
A. out of buffer
B. Address spoofing
C. Denial of service
D. Violent attack
1 branch
problem 43
Network sniffing , The network card of the sniffer server must be set to ( )
A. Broadcast mode
B. Multicast mode
C. Direct way
D. Mixed mode
1 branch
problem 44
Which of the following is not a means to prevent network monitoring .( )
A. Network segmentation
B. Use the switch
C. encryption
D. Authentication
1 branch
problem 45
By setting up the network interface ( network card ) Of (), You can make it accept packets whose destination address does not point to its own network , So as to achieve the purpose of network sniffing attack .
A. Sharing mode
B. Exchange mode
C. Hybrid mode
D. Random mode
1 branch
problem 46
The following does not belong to the data receiving mode of the network card ( )
A. Broadcast mode
B. Multicast mode
C. Common mode
D. Indirect mode
1 branch
problem 47
Network administrators can take advantage of a switch that provides a method called () Real time network monitoring .
A. Port multiplexing
B. Port Mirror
C. Access control list
D. Port broadcast
1 branch
problem 48
( ) It refers to the data frame received or sent by one or more ports of the switch , Exactly the same copy to the specified port or ports .
A. Port multiplexing
B. Port Mirror
C. Port designation
D. Port replication
1 branch
problem 49
() The main function of the agreement is centralized management and distribution IP Address , Make the host in the network environment dynamically obtain ip Address , Gateway address and DNS Server address and other information , And can improve the usage rate of address .
A.ICMP
B.DHCP
C.ARP
D.RARP
1 branch
problem 50
DHCP Use () Protocol as its transport protocol .
A.TCP
B.ICMP
C.UDP
D.RARP
1 branch
problem 51
DHCP Clinet Send by broadcast () message
A.DHCP Offer
B.DHCP Discover
C.DHCP Request
D.DHC PACK
1 branch
problem 52
all DHCP The server receives DHCP Sent by the client DHCP Discover After the message , Will respond , towards DHCP The client sends one () request .
A.DHCP Offer
B. DHCP Discover
C.DHCP Request
D.DHC PACK
1 branch
problem 53
The network card works in (), Its address is called MAC Address or hardware address .
A. The physical layer
B. The network layer
C. Data link layer
D. application layer
1 branch
problem 54
The attacker intercepted and recorded from A To B The data of , Then the information is extracted from the data intercepted earlier and sent back to B be called ().
A. Man-in-the-middle attack
B. Password guessing and dictionary attacks
C. Powerful attack
D. Replay attack
1 branch
problem 55
Network intruders use sniffer Listen to the network , In the method of firewall Authentication , The following identity authentication may cause unsafe consequences ( )
A. Password based authentication
B. Address based authentication
C. Password authentication
D. Are not
1 branch
problem 56
Web malicious code usually exploits () To implant and attack .
A. Password attack
B.U Disk tools
C.IE Browser vulnerabilities
D. Denial of service attacks
1 branch
problem 57
For the rebound port type Trojan horse ,( ) Open the port actively , And it's in a listening state .Ⅰ. Trojan client Ⅱ. The server side of the Trojan horse Ⅲ. Third party servers
A.I
B.Ⅱ
C.Ⅲ
D. Ⅰ or Ⅲ
1 branch
problem 58
The following description relates to the Trojan horse ( ).
A. It consists of client program and server program
B. Infect files on your computer
C. Destroy the computer system
D. Copy yourself
1 branch
problem 59
Involving property and important personal accounts , To prevent forgetting the password , have access to “ Remember the password ” Login mode of .
Yes
wrong
1 branch
problem 60
Many vulnerabilities are defects and errors in software design .
Yes
wrong
1 branch
problem 61
The network system shall be equipped with a vulnerability or vulnerability scanning system , It is used to detect whether there are security vulnerabilities in the network .
Yes
wrong
1 branch
problem 62
When setting the password , Better be greater than 6 position , And it is a combination of numbers, letters and symbols .
Yes
wrong
1 branch
problem 63
For the attacker , Information is the best tool , Password attack is the main method to obtain this information .
Yes
wrong
1 branch
problem 64
It is better for users to use simple when selecting passwords 、 Re used passwords , For easy memory .
Yes
wrong
1 branch
problem 65
Opening the account policy can effectively prevent the password from being brutally attacked .
Yes
wrong
1 branch
problem 66
Brute force cracking and dictionary attack belong to the same kind of network attack , The dictionary used in brute force cracking is wider than that used in dictionary attack .
Yes
wrong
1 branch
problem 67
Microsoft from Windows7 Start , stay SAM By default, the file is deleted LM password .
Yes
wrong
1 branch
problem 68
Cryptography is the foundation and core of information security , It is the most important means to guard against various security threats .
Yes
wrong
1 branch
problem 69
Password dictionary is the key to password cracking .
Yes
wrong
1 branch
problem 70
" Most current security technologies ( Such as user name and password 、 One time password and two-way authentication ) It can also meet the security needs of enterprises , These traditional technologies usually require different maintenance and management measures ."
Yes
wrong
1 branch
problem 71
It is strictly prohibited to use empty port command and password with the same user name .
Yes
wrong
1 branch
problem 72
Don't choose a password that can be found in any dictionary or language .
Yes
wrong
1 branch
problem 73
Do not choose a password consisting of simple letters .
Yes
wrong
1 branch
problem 74
For memory purposes , You can choose the password related to your personal information .
Yes
wrong
1 branch
problem 75
Don't choose shorter than 6 Characters or only letters or numbers .
Yes
wrong
1 branch
problem 76
Do not select a password published as a password example .
Yes
wrong
1 branch
problem 77
Passwords are often digitally mixed and easy to remember .
Yes
wrong
1 branch
problem 78
An attacker can brutally crack the password of a user's mailbox through an email password guessing program .
Yes
wrong
1 branch
problem 79
Confirmation is the identification of the authentication user , Such as login password verification 、 Fingerprint verification 、 Electronic certificate memory .
Yes
wrong
1 branch
problem 80
IP After successful address spoofing , The target machine will not respond .
Yes
wrong
1 branch
problem 81
DHCP The server can only provide... To the client IP Address and gateway address , And cannot provide DNS Server's IP Address .
Yes
wrong
1 branch
problem 82
ARP The function of the protocol is to convert the physical address into IP Address .
Yes
wrong
1 branch
problem 83
The possible security threats to the physical layer are wiretapping and eavesdropping .
Yes
wrong
1 branch
problem 84
DNS and SNMP It's all used TCP communicate .
Yes
wrong
1 branch
problem 85
Ping Use ICMP The maximum protocol packet size is 6535.
Yes
wrong
1 branch
problem 86
Deceptive attack (Spoofing) It refers to the complex technology that enables one machine to authenticate another machine by forging packets from trusted addresses .
Yes
wrong
1 branch
problem 87
ARP The cache can only store the data obtained by active query IP and MAC Correspondence of , It will not save the information received in the form of broadcast IP and MAC Correspondence of .
Yes
wrong
1 branch
problem 88
IP Deception technology is to forge a host IP The technology that address swindles privilege to attack .
Yes
wrong
1 branch
problem 89
DHCP The server can only provide... To the client IP Address and gateway address , And cannot provide DNS Server's IP Address .
Yes
wrong
1 branch
problem 90
Sniffer is the use of computer network interface , A technique for intercepting datagrams from a destination computer .
Yes
wrong
1 branch
problem 91
Sniffer Through the acquisition of network packets to analyze the status of network communication and security monitoring .
Yes
wrong
1 branch
problem 92
The main function of the hub is to broadcast packets , Send the data packets received on one interface to all interfaces in a group .
Yes
wrong
1 branch
problem 93
ARP Virus programs often disguise the infected host as a gateway .
Yes
wrong
1 branch
problem 94
ARP Spoofing is not an effective means to implement network monitoring .
Yes
wrong
1 branch
problem 95
ARP Virus programs do not use ARP Spoofing the implementation of man in the middle attacks to monitor the communication data between two hosts .
Yes
wrong
1 branch
problem 96
DHCP Discover It's broadcast , Therefore, it can only be carried out in the same network segment .
Yes
wrong
1 branch
problem 97
The domain name system of the Internet DNS Is an online distributed database system , And use the client / Server mode .
Yes
wrong
1 branch
problem 98
ARP Deception is a widely used means of monitoring , You can use static binding ARP To deal with it .
Yes
wrong
1 branch
problem 99
DHCP The terminal can be provided with IP Address 、 gateway 、DNS Server address and other parameters .
Yes
wrong
1 branch
problem 100
The best way to prevent network eavesdropping is to encrypt the information on the Internet , Yes, the listener does not recognize these information patterns .
Yes
wrong
answer :
DDCCC BDBCA
BCADC DBAAC
DDBBB DCDBB
CDAAA AADDB
ABDAC DBBBC
BACDA CDABA
ABABA AAAAB
BAABA BAABB
BBABB ABABA
AAABB AAAAA
边栏推荐
- LeetCode 3. Longest substring without repeated characters & sliding window
- R语言plotly可视化:plotly可视化二维直方图等高线图(Basic 2D Histogram Contour)
- On location and scale in CNN
- JVM | runtime data area (heap space)
- 【ELT.ZIP】OpenHarmony啃论文俱乐部—数据密集型应用内存压缩
- mysql事务讲解
- LeetCode-101-对称二叉树
- Redis6
- [in depth understanding of tcapulusdb technology] tcapulusdb operation and maintenance doc
- [in depth understanding of tcapulusdb technology] tcapulusdb regular documents
猜你喜欢

03 runtime data area overview and threads
![[in depth understanding of tcapulusdb technology] new models of tcapulusdb](/img/10/f94a5e1ebeaa803c754dd77351950f.png)
[in depth understanding of tcapulusdb technology] new models of tcapulusdb
![[deeply understand tcapulusdb technology] create a game area for document acceptance](/img/7b/8c4f1549054ee8c0184495d9e8e378.png)
[deeply understand tcapulusdb technology] create a game area for document acceptance

Analysis on employment compensation of 2021 college graduates: the average monthly starting salary of doctors, masters, undergraduates and junior colleges is 14823 yuan, 10113 yuan, 5825 yuan and 3910
![In 2021, China's private equity market is growing, and the scale of private equity fund management reaches 19.78 trillion yuan [figure]](/img/e9/ffc5303cb6f0f8e05e93b3342a49b2.jpg)
In 2021, China's private equity market is growing, and the scale of private equity fund management reaches 19.78 trillion yuan [figure]
![Analysis on China's aluminum foil output, trade and enterprise leading operation in 2021: dongyangguang aluminum foil output is stable [figure]](/img/e8/027e8a6cbdc4454e7a18ed7aa2122a.jpg)
Analysis on China's aluminum foil output, trade and enterprise leading operation in 2021: dongyangguang aluminum foil output is stable [figure]

【ELT.ZIP】OpenHarmony啃论文俱乐部—见证文件压缩系统EROFS

广州华锐互动VR全景为各行各业带来发展

Tiger Dao VC products are officially launched, a powerful supplement to seektiger ecology

Leetcode-78-subset
随机推荐
Why are life science enterprises on the cloud in succession?
mysql事务讲解
How to sort massive data? How to process data between memory and hard disk?
JS some small problems about adding and accessing values to arrays
mysql视图讲解
Basic operation details of binary search tree (BST) (complete code, including test cases)
Electronic basic project construction & communication between main thread and rendering thread
QQ robot: self forbidden words management of group members [latest beta2 version]
网络安全检测与防范 测试题(五)
Analysis of China's medical device industry development environment (PEST) in 2021: the awareness of medical care is enhanced, and the demand for medical device products is also rising [figure]
Command records of common data types for redis cli operations
Guangzhou Sinovel interactive VR panorama brings development to all walks of life
Redis 5.0 data structure double end linked list source code analysis
Training of long and difficult sentences in postgraduate entrance examination day86
R语言使用DALEX包的model_profile函数基于条件依赖CDP方法解释多个分类模型中某个连续特征和目标值y的关系(Conditional Dependence Plots)
[deeply understand tcapulusdb technology] tmonitor module architecture
Comparison rules of strings in JS
03 runtime data area overview and threads
【ELT.ZIP】OpenHarmony啃论文俱乐部—数据密集型应用内存压缩
最新数据挖掘赛事方案梳理!