当前位置:网站首页>Network security detection and prevention test questions (4)

Network security detection and prevention test questions (4)

2022-06-25 18:55:00 9JiuJiu

problem 1

 About personal biometric information , Which of the following is a reasonable treatment ( ).
		A. Inform the collection purpose in the privacy policy text 
		B. Share personal biometric information with partners 
		C. Public disclosure of personal biometric information 
		D. Only the summary information of personal biometric information is retained 

1 branch
problem 2

 When selecting vulnerability assessment products, you should pay attention to ().
		A. Whether there is a network 、 Host and database vulnerability detection function 
		B. Product scanning capability 
		C. Product vulnerability repair capability 
		D. All of the above are true 

1 branch
problem 3

" Network vulnerability scanning system through remote detection ( )TCP/IP Services on different ports , Record the answers given by the goal ."
		A. The source host 
		B. Router 
		C. The target host 
		D. None of the above 

1 branch
problem 4

" Use the scanning method of vulnerability library matching , Can find ( )."
		A. Unknown vulnerability 
		B. Known vulnerabilities 
		C. Vulnerabilities in self-designed Software 
		D. All the loopholes 

1 branch
problem 5

( ) A system is a program that automatically detects security weaknesses in a remote or local host .
		A. Intrusion detection 
		B. A firewall 
		C. Vulnerability scanning 
		D. Intrusion Prevention 

1 branch
problem 6

 The following description of computer vulnerabilities is wrong ( ).
		A. Loopholes can be fixed 
		B. As long as the design is rigorous, there will be no loopholes 
		C. No system can avoid vulnerabilities 
		D. Vulnerabilities are easy to be discovered and exploited by hackers 

1 branch
problem 7

 In biometric authentication , What is not appropriate as a certification feature is ( ).
		A. The fingerprint 
		B. iris 
		C. Face portrait 
		D. weight 

1 branch
problem 8

 Network vulnerability scanning can ().
		A. Discover the target host or network 
		B. Determine the type of operating system 
		C. Confirm that the port is open 
		D. Test the system for security vulnerabilities 

1 branch
problem 9

 The following statement about user password is wrong ( )
		A. Password cannot be set to null 
		B. The longer the password length , The more secure 
		C. Complex password security is high enough , There is no need to modify it regularly 
		D. Password authentication is the most common authentication mechanism 

1 branch
problem 10

 Register users online , When setting the user password, you should ( ).
		A. Involving property 、 The password of payment account shall be high-strength password 
		B. Set up 123456 Easy to remember numbers 、 Letters are passwords 
		C. All accounts are passwords , Easy to use 
		D. Use your or your parents' birthdays as passwords 

1 branch
problem 11

 stay  Windows Operating system , The password of the account is generally in ( ) Form preservation .
		A. Plaintext 
		B. Encrypted ciphertext 
		C. Message after digital signature 
		D. Hash value after hash transformation 

1 branch
problem 12

Windows The security log of the operating system passes ( ) Set up .
		A. Event viewer 
		B. Service Manager 
		C. Local security policy 
		D. network adapter 

1 branch
problem 13

 When a user logs in to the host anonymously , The user is called ( ).
		A.Guest
		B.OK
		C.Admin
		D.Anonymous

1 branch
problem 14

( ) No Windows Share access to .
		A. read-only 
		B. Complete control of 
		C. change 
		D. Read and execute 

1 branch
problem 15

 stay Windows Operating system , Be similar to “S-1-5-21-839522115-1060284298-85424-5398-500” The value of represents ().
		A.DN
		B.UPN
		C.SID
		D.GUID

1 branch
problem 16

 The following are not  UNIX/Linux The password setting principle of the operating system is ( ).
		A. The password should be in English letters 、 Numbers 、 Punctuation 、 Control the combination of characters, etc 
		"B. Don't use English words , Vulnerable to dictionary attacks "
		C. Don't use yourself 、 family 、 Pet's name 
		D. Be sure to choose a character length of 8 Bit string as password 

1 branch
problem 17

"Windows NT and Windows 2000 The system can be set to lock the account after several invalid logins , This prevents ()"
		A. Trojan horse 
		B. Violent attack 
		C.IP cheating 
		D. Cache overflow attack 

1 branch
problem 18

 The process by which an illegal recipient attempts to analyze plaintext after intercepting a ciphertext is called ()
		A. Decipher 
		B. Decrypt 
		C. encryption 
		D. attack 

1 branch
problem 19

 Which of the following methods cannot prevent password attacks ( ).
		A. Enable firewall function 
		B. Set complex system authentication password 
		C. Turn off unwanted network services 
		D. Modify the system default authentication name 

1 branch
problem 20

Windows  Operating system usage () Perform security management on user accounts .
		A.RAM
		B.ROM
		C.SAM
		D.Cache

1 branch
problem 21

 The administrator sets the system login password as simple “123456”, Which of the following security vulnerabilities is this ?( )
		A. System FLAW 
		B. Application Service Vulnerability 
		C. Information leak vulnerability 
		D. Weak password vulnerability 

1 branch
problem 22

 The best rule to follow when creating a password is  ( ) .
		A. Use English words 
		B. Choose a password that is easy to remember 
		C. Use the names of yourself and your family 
		D. Try to choose a long password 

1 branch
problem 23

 The attack method of guessing the system interface by trying all possible character combinations used by the system is called ().
		A. Back door attack 
		B. Violent attack 
		C. out of buffer 
		D. Man-in-the-middle attack 

1 branch
problem 24

 Which of the following attacks is most commonly used to crack passwords ?( )
		A. To cajole ( spoofing)
		B. Dictionary attack (dictionary attack)
		C. Denial of service (DoS)
		D.WinNuk

1 branch
problem 25

 Network monitoring is ( ).
		A. Remotely observe a user's computer 
		B. Monitor the status of the network 、 Transmitted data stream 
		C. monitor PC Operating condition 
		D. Monitor the development direction of a website 

1 branch
problem 26

 If a computer in the LAN is affected by ARP cheating , So the packets it sends out ,( ) It's wrong. .
		A. Source IP Address 
		B. Purpose IP Address 
		C. Source MAC Address 
		D. Purpose MAC Address 

1 branch
problem 27

 stay Windows Operating system , To gateway IP Address and MAC The operation command for binding addresses is ().
		A. arp -a 192.168.0.1 00-0a-03-aa-5d-ff
		B. arp -d 192.168.0.1 00-0a-03-aa-5d-ff
		C. arp -s 192.168.0.1 00-0a-03-aa-5d-ff
		D. arp -g 192.168.0.1 00-0a-03-aa-5d-ff

1 branch
problem 28

 When a user visits a legitimate website through a domain name , What I opened was an unhealthy website , The reason for this phenomenon may be ( ).
		A. ARP cheating 
		B. DHCP cheating 
		C.TCP SYN attack 
		D.DNS Cache poisoning 

1 branch
problem 29

" Defense network monitoring , The most common method is ( )."
		A. Using physical transmission ( Non network )
		B. Information encryption 
		C. Wireless network 
		D. Using private line transmission 

1 branch
problem 30

ARP The agreement is to ( ) Address converted to ( ) The agreement .
		A.IP、 port 
		B.IP、MAC
		C.MAC、IP
		D.MAC、 port 

1 branch
problem 31

Man-in-the-middle  attack , abbreviation MITM, namely ().
		A. Replay attack 
		B. Denial of service attacks 
		C. Man-in-the-middle attack 
		D. Backdoor vulnerability attack 

1 branch
problem 32

" About  DHCP Deceptive attack , Which of the following descriptions is wrong ?( )"
		A. Sent by the terminal  DHCP Discovery messages reach all DHCP The server 
		B. Terminal cannot be identified  DHCP Provide the identity of the message sender 
		C. The terminal cannot distinguish  DHCP Correctness of network information in the server 
		D. Ethernet cannot prevent counterfeiting  DHCP  The server provides network information configuration services 

1 branch
problem 33

ARP The essence of deception is ( )
		A. Provide virtual MAC And IP The combination of addresses 
		B. Let other computers know that they exist 
		C. Steal data transmitted by users in the network 
		D. Disrupt the normal operation of the network 

1 branch
problem 34

 When carrying out network attack and identity hiding , Which of the following network information should not be cheated or embezzled ?( )
		A.MAC Address 
		B.IP Address 
		C. Mail account 
		D. None of the above 

1 branch
problem 35

 Eavesdropping is a kind of () attack , The attacker () Insert your own system between the sending station and the receiving station . Interception is a kind of () attack , The attacker () Insert your own system between the sending station and the receiving station .
		"A. passive , need not , Take the initiative , must  "
		"B. Take the initiative , must , passive , need not "
		"C. Take the initiative , need not , passive , must  "
		"D. passive , must , Take the initiative , need not "

1 branch
problem 36

 Internet eavesdropping (Sniffer) It can capture the sensitive information flowing through the network , The following statement is wrong ()
		A. After the password is encrypted , Will not be bugged 
		B.Cookie Fields can be bugged 
		C. Messages and frames can be bugged 
		D. Advanced eavesdroppers can also ARPSpoof, Man-in-the-middle attack 

1 branch
problem 37

 Hackers use IP Address attack methods are ( )
		A.IP cheating 
		B. Decrypt 
		C. Steal the password 
		D. Send the virus 

1 branch
problem 38

 Which of the following is the solution to ARP An effective method of spoofing attacks ()?
		A. Static configuration for each terminal IP Address and MAC Binding relationship between addresses 
		B. Each terminal has any difference IP Address and MAC The ability of an address pair to be valid 
		C. Each terminal has ARP The ability to identify the message source 
		D. The switch establishes the terminal to which each port is connected IP Address and MAC The address of 

1 branch
problem 39

 In the following attacks , Which attack is not defensible by statically configured access control lists ()?
		A.MAC Table overflow attack 
		B.MAC Address spoofing attack 
		C.DHCP Deceptive attack 
		D.ARP Deceptive attack 

1 branch
problem 40

 Network monitoring ( Sniffing ) This form of attack destroys which of the following ?( )
		A. Non repudiation of network information 
		B. Confidentiality of network information 
		C. Availability of network services 
		D. Integrity of network information 

1 branch
problem 41

() The protocol can be used to map the physical address of a computer to a temporarily specified network address .
		A.ARP
		B.SNMP
		C.DHCP
		D..FTP

1 branch
problem 42

 Suppose you send a specific packet to a remote host , But you don't want the remote host to respond to your packets . What type of attack do you use ? ( )
		A. out of buffer 
		B. Address spoofing 
		C. Denial of service 
		D. Violent attack 

1 branch
problem 43

 Network sniffing , The network card of the sniffer server must be set to  ( )
		A. Broadcast mode 
		B. Multicast mode 
		C. Direct way 
		D. Mixed mode 

1 branch
problem 44

 Which of the following is not a means to prevent network monitoring  .( )
		A. Network segmentation 
		B. Use the switch 
		C. encryption 
		D. Authentication 

1 branch
problem 45

 By setting up the network interface ( network card ) Of (), You can make it accept packets whose destination address does not point to its own network , So as to achieve the purpose of network sniffing attack .
		A. Sharing mode 
		B. Exchange mode 
		C. Hybrid mode 
		D. Random mode 

1 branch
problem 46

 The following does not belong to the data receiving mode of the network card ( )
		A. Broadcast mode 
		B. Multicast mode 
		C. Common mode 
		D. Indirect mode 

1 branch
problem 47

 Network administrators can take advantage of a switch that provides a method called () Real time network monitoring .
		A. Port multiplexing 
		B. Port Mirror 
		C. Access control list 
		D. Port broadcast 

1 branch
problem 48

( ) It refers to the data frame received or sent by one or more ports of the switch , Exactly the same copy to the specified port or ports .
		A. Port multiplexing 
		B. Port Mirror 
		C. Port designation 
		D. Port replication 

1 branch
problem 49

() The main function of the agreement is centralized management and distribution IP Address , Make the host in the network environment dynamically obtain ip Address , Gateway address and DNS Server address and other information , And can improve the usage rate of address .
		A.ICMP
		B.DHCP
		C.ARP
		D.RARP

1 branch
problem 50

DHCP Use () Protocol as its transport protocol .
		A.TCP
		B.ICMP
		C.UDP
		D.RARP

1 branch
problem 51

DHCP Clinet Send by broadcast () message 
		A.DHCP Offer
		B.DHCP Discover
		C.DHCP Request
		D.DHC PACK

1 branch
problem 52

 all DHCP The server receives DHCP Sent by the client DHCP Discover After the message , Will respond , towards DHCP The client sends one () request .
		A.DHCP Offer
		B. DHCP Discover
		C.DHCP Request
		D.DHC PACK

1 branch
problem 53

 The network card works in (), Its address is called MAC Address or hardware address .
		A. The physical layer 
		B. The network layer 
		C. Data link layer 
		D. application layer 

1 branch
problem 54

 The attacker intercepted and recorded from A To B The data of , Then the information is extracted from the data intercepted earlier and sent back to B be called ().
		A. Man-in-the-middle attack 
		B. Password guessing and dictionary attacks 
		C. Powerful attack 
		D. Replay attack 

1 branch
problem 55

 Network intruders use sniffer Listen to the network , In the method of firewall Authentication , The following identity authentication may cause unsafe consequences ( )
		A. Password based authentication 
		B. Address based authentication 
		C. Password authentication 
		D. Are not 

1 branch
problem 56

 Web malicious code usually exploits () To implant and attack .
		A. Password attack 
		B.U Disk tools 
		C.IE Browser vulnerabilities 
		D. Denial of service attacks 

1 branch
problem 57

 For the rebound port type Trojan horse ,( ) Open the port actively , And it's in a listening state .Ⅰ. Trojan client  Ⅱ. The server side of the Trojan horse  Ⅲ. Third party servers 
		A.I
		B.Ⅱ
		C.Ⅲ
		D. Ⅰ or Ⅲ

1 branch
problem 58

 The following description relates to the Trojan horse ( ).
		A. It consists of client program and server program 
		B. Infect files on your computer 
		C. Destroy the computer system 
		D. Copy yourself 

1 branch
problem 59

 Involving property and important personal accounts , To prevent forgetting the password , have access to “ Remember the password ” Login mode of .

 Yes 

 wrong 

1 branch
problem 60

 Many vulnerabilities are defects and errors in software design .

 Yes 

 wrong 

1 branch
problem 61

 The network system shall be equipped with a vulnerability or vulnerability scanning system , It is used to detect whether there are security vulnerabilities in the network .

 Yes 

 wrong 

1 branch
problem 62

 When setting the password , Better be greater than 6 position , And it is a combination of numbers, letters and symbols .

 Yes 

 wrong 

1 branch
problem 63

 For the attacker , Information is the best tool , Password attack is the main method to obtain this information .

 Yes 

 wrong 

1 branch
problem 64

 It is better for users to use simple when selecting passwords 、 Re used passwords , For easy memory .

 Yes 

 wrong 

1 branch
problem 65

 Opening the account policy can effectively prevent the password from being brutally attacked .

 Yes 

 wrong 

1 branch
problem 66

 Brute force cracking and dictionary attack belong to the same kind of network attack , The dictionary used in brute force cracking is wider than that used in dictionary attack .

 Yes 

 wrong 

1 branch
problem 67

 Microsoft from Windows7 Start , stay SAM By default, the file is deleted LM password .

 Yes 

 wrong 

1 branch
problem 68

 Cryptography is the foundation and core of information security , It is the most important means to guard against various security threats .

 Yes 

 wrong 

1 branch
problem 69

 Password dictionary is the key to password cracking .

 Yes 

 wrong 

1 branch
problem 70

" Most current security technologies ( Such as user name and password 、 One time password and two-way authentication ) It can also meet the security needs of enterprises , These traditional technologies usually require different maintenance and management measures ."

 Yes 

 wrong 

1 branch
problem 71

 It is strictly prohibited to use empty port command and password with the same user name .

 Yes 

 wrong 

1 branch
problem 72

 Don't choose a password that can be found in any dictionary or language .

 Yes 

 wrong 

1 branch
problem 73

 Do not choose a password consisting of simple letters .

 Yes 

 wrong 

1 branch
problem 74

 For memory purposes , You can choose the password related to your personal information .

 Yes 

 wrong 

1 branch
problem 75

 Don't choose shorter than 6 Characters or only letters or numbers .

 Yes 

 wrong 

1 branch
problem 76

 Do not select a password published as a password example .

 Yes 

 wrong 

1 branch
problem 77

 Passwords are often digitally mixed and easy to remember .

 Yes 

 wrong 

1 branch
problem 78

 An attacker can brutally crack the password of a user's mailbox through an email password guessing program .

 Yes 

 wrong 

1 branch
problem 79

 Confirmation is the identification of the authentication user , Such as login password verification 、 Fingerprint verification 、 Electronic certificate memory .

 Yes 

 wrong 

1 branch
problem 80

IP After successful address spoofing , The target machine will not respond .

 Yes 

 wrong 

1 branch
problem 81

DHCP The server can only provide... To the client IP Address and gateway address , And cannot provide DNS Server's IP Address .

 Yes 

 wrong 

1 branch
problem 82

ARP The function of the protocol is to convert the physical address into IP Address .

 Yes 

 wrong 

1 branch
problem 83

 The possible security threats to the physical layer are wiretapping and eavesdropping .

 Yes 

 wrong 

1 branch
problem 84

DNS and SNMP It's all used TCP communicate .

 Yes 

 wrong 

1 branch
problem 85

Ping Use ICMP The maximum protocol packet size is 6535.

 Yes 

 wrong 

1 branch
problem 86

 Deceptive attack (Spoofing) It refers to the complex technology that enables one machine to authenticate another machine by forging packets from trusted addresses  .

 Yes 

 wrong 

1 branch
problem 87

ARP The cache can only store the data obtained by active query IP and MAC Correspondence of , It will not save the information received in the form of broadcast IP and MAC Correspondence of .

 Yes 

 wrong 

1 branch
problem 88

IP Deception technology is to forge a host IP The technology that address swindles privilege to attack .

 Yes 

 wrong 

1 branch
problem 89

DHCP The server can only provide... To the client IP Address and gateway address , And cannot provide DNS Server's IP Address .

 Yes 

 wrong 

1 branch
problem 90

 Sniffer is the use of computer network interface , A technique for intercepting datagrams from a destination computer .

 Yes 

 wrong 

1 branch
problem 91

Sniffer Through the acquisition of network packets to analyze the status of network communication and security monitoring .

 Yes 

 wrong 

1 branch
problem 92

 The main function of the hub is to broadcast packets , Send the data packets received on one interface to all interfaces in a group .

 Yes 

 wrong 

1 branch
problem 93

ARP Virus programs often disguise the infected host as a gateway .

 Yes 

 wrong 

1 branch
problem 94

ARP Spoofing is not an effective means to implement network monitoring .

 Yes 

 wrong 

1 branch
problem 95

ARP Virus programs do not use ARP Spoofing the implementation of man in the middle attacks to monitor the communication data between two hosts .

 Yes 

 wrong 

1 branch
problem 96

DHCP Discover It's broadcast , Therefore, it can only be carried out in the same network segment .

 Yes 

 wrong 

1 branch
problem 97

 The domain name system of the Internet DNS Is an online distributed database system , And use the client / Server mode .

 Yes 

 wrong 

1 branch
problem 98

ARP Deception is a widely used means of monitoring , You can use static binding ARP To deal with it .

 Yes 

 wrong 

1 branch
problem 99

DHCP The terminal can be provided with IP Address 、 gateway 、DNS Server address and other parameters .

 Yes 

 wrong 

1 branch
problem 100

 The best way to prevent network eavesdropping is to encrypt the information on the Internet , Yes, the listener does not recognize these information patterns .

 Yes 

 wrong 

answer :
DDCCC BDBCA
BCADC DBAAC
DDBBB DCDBB
CDAAA AADDB
ABDAC DBBBC
BACDA CDABA
ABABA AAAAB
BAABA BAABB
BBABB ABABA
AAABB AAAAA

原网站

版权声明
本文为[9JiuJiu]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/176/202206251820491079.html