雨課堂學(xué)堂在線學(xué)堂云《Network Security and Management(重慶工商職業(yè)學(xué)院)》單元測試考核答案_第1頁
雨課堂學(xué)堂在線學(xué)堂云《Network Security and Management(重慶工商職業(yè)學(xué)院)》單元測試考核答案_第2頁
雨課堂學(xué)堂在線學(xué)堂云《Network Security and Management(重慶工商職業(yè)學(xué)院)》單元測試考核答案_第3頁
雨課堂學(xué)堂在線學(xué)堂云《Network Security and Management(重慶工商職業(yè)學(xué)院)》單元測試考核答案_第4頁
雨課堂學(xué)堂在線學(xué)堂云《Network Security and Management(重慶工商職業(yè)學(xué)院)》單元測試考核答案_第5頁
免費預(yù)覽已結(jié)束,剩余5頁可下載查看

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

第1題ThemainmethodsforsafeguardingtheintegrityofinformationdonotincludeAPasswordcheckingandmethods

BErrorcorrectioncodingmethodsCDigitalsignaturesDInstallationoffirewalls第2題ReliabilitydoesnotincludeADestructionresistance

B

Confidentiality

CEffectivenessDSurvival

第3題Informationsecurityguaranteesinclude:()

ATechnicalguaranteesBManagementguaranteesCPersonneltrainingguarantees

DLegalandregulatoryguarantees

正確答案:ABCD第4題Securitymeasuresforinformationsecurityassuranceinclude:()

AFirewalls

BAnti-virus

CVulnerabilityscanning

DIntrusiondetection

正確答案:ABCD第5題Theoperatingsystemsecuritymanagementobjectivesinclude

APreventionofunlawfuloperations

BDataprotection

CManagingusers

DSystemprotection

E

Ensuringsystemintegrity

正確答案:ABCDE第1題Isnetworkeavesdroppingapassive-aggressivebehavior?第2題Inordertodefendagainstnetworkeavesdropping,themostcommonlyusedmethodsare

A

Useofphysicaltransmission(non-networked)

BEncryptionofinformation

CWirelessnetworks

DTransmissionoverdedicatedlines

第3題TCPandUDPbelongto()protocols

ATransportlayerBDatalinklayer

CNetworklayer

DNoneoftheabove

第4題TCPprotocoldistinguishesbetweendifferentconnectionsby().

APortnumber

BPortnumberandIPaddress

CPortnumberandMACaddress

DIPaddressandMACaddress

第5題Topreventnetworkeavesdropping,themostusedmethodismessageencryption

Chaptertest第1題DESisthemostfamoussymmetriccipheralgorithm,whichbelongstothegroupingcipher,thenumberofbitsoftheplaintextgroupingis

A64B56C128D256第2題Encryptionhassymmetrickeyencryption,asymmetrickeyencryptiontwokindsofencryption,whichsymmetrickeyencryptionrepresentativealgorithmis:

AIDE

BDES

CPGP

DPKI

ERSA

第3題Themaindisadvantagesofsymmetrickeycryptosystemsare:()

A

Slowspeedofencryptionanddecryption

BKeydistributionandmanagementissues

CLimitationsofapplication

DTheencryptionkeyisdifferentfromthedecryptionkey.

第4題InRSApublickeyencryptionsystem,hewantstosendheramail,andletherknowthathesent,theencryptionsecretkeyshouldbechosenis().

AHispublickey

BHerpublickey

CHisprivatekey

DHerprivatekey

第5題IntermsoftherelationshipbetweenCAanddigitalcertificates,whichofthefollowingstatementsisincorrect

Adigitalcertificateistoensurethesecurityofcommunicationbetweenthetwosidesoftheelectronictrustrelationship,hewasissuedbytheCA

BDigitalcertificatesgenerallyrelyontheCAcenter'ssymmetrickeymechanismtorealizethe

C

Inelectronictransactions,digitalcertificatescanbeusedtoidentifytheparticipants.

DDigitalcertificatescanprovetheidentityofthecertificateholderinawaythatcannotbecounterfeited.

Chaptertest第1題WindowsNTandWindows2000systemscanbesettolocktheaccountafterseveralinvalidlogins,whichcanprevent()

ATrojanhorses.

BViolentattacks.

CIPspoofing.

D

Cacheoverflowattacks

第2題Which

levelofsecuritystandardsare,UnixandWindowsNT,theoperatingsysteminlinewith?

ALevelA

BLevel

BCLevel

CDLevel

D第3題Built-inuseraccountsinWindowsaredividedinto:

AAdministrator

BGuest

CServer

DLocal

正確答案:AB第4題LocalsecuritypolicyinWindowsincludes

AAccountstrategy

BLocalpolicy

CPublickeystrategy

DSoftwarerestrictionpolicies

正確答案:ABCD第5題WindowsDefenderSecurityCenterincludeswhichofthefollowingoptions?

AVirusandthreatprotection

B

Accountprotection

CFirewallsandnetworkprotection

DEquipmentperformanceandoperationalstatus

正確答案:DCBAChaptertest第1題

Trojanhorsevirusesare:

AMacroviruses

BIntroducedviruses

CWorms

DService/client-basedviruses

第2題Accordingtotheclassificationofinfectedobjects,CIHvirusbelongstowhichcategoryofviruses?

A

Lead-inzoneviruses

BFile-basedviruses

CMacroviruses

DCompositeviruses

第3題Computervirusesare()

AAnorder

BAprogram

CAmarker

DOnedocument

第4題Whatisamacrovirus?

AMacrovirusesinfectallfiles

B

Amacrovirusisasetofinstructions

CMacrovirusesinfectonlyMicrosoftOfficecomponents

DMacrovirusesrunautomaticallyanddonotneedtorunwiththedocument.

第5題Forfloppydisksthathavebeeninfectedwithviruses,themostthoroughwaytoremovevirusesisto().

ASterilizethediskettewithalcohol

BCookinapressurecooker

CRemovalofvirus-infectedprograms

DFormattingfloppydisks

Chaptertest第1題Althoughcookiesbringquickandconvenientaccesstowebpages,theymayleadtoinformationleakage.

第2題Tominimizetherisk,itisnotrecommendedtousetheInternetserviceis().

AWebservices

BExternalaccesstointernalsystems

CInternalaccesstotheInternet

DFTPservices

第3題OntheInternet,commonsecuritythreatsinclude.

ADenial-of-serviceattacks

BSharingofresources

CProliferationofARPattacks

DUnauthorizedresourcevisits

正確答案:ACD第4題Whatarethesecuritylevelsofthebrowser?

AHigh

BMedium

CMedium-low

DLow

正確答案:ABCD第5題Thebrowserisaccessedby?

AInternetBLocalInternet

CTrustedsites

DRestrictedsites

正確答案:ABCDChaptertest第1題Attacksthatfirewallscandefendagainstinclude:

AsinglepacketattacksBscanningattacks

Cfloodingattacks正確答案:ABC第2題Firewallisa()

ASeparators,limiters,analyzers

BIsolators,controllers,analyzers

CSeparator,controller,resolver

第3題Thecurrentfirewallpreventionismainly()

AProactiveprevention

BPassiveprevention

CNotnecessarily

第4題Firewalldeployment()

AThefirewallonlyneedstobesetupattheentranceandexitconnectedtotheInternet.

B

Firewallsaredeployedatallentrancesandexitsthatneedtoprotectthelocalareanetwork.CFirewalldeploymentneedstobedeployedbetweentheentranceandnetworksegments.

第5題Firewallpolicyisalsoknownasthesecurityrulesofthefirewall,whichisanimportantbasisforthefirewalltoimplementnetworkprotection.Chaptertest第1題Thefirststepinanintrusiondetectionsystemis:()

ASignalAnalysis

B

Informationgathering

CPacketfiltering

DPacketinspection

第2題IDSrulesincludenetworkmisuseand:()

ANetworkanomalies

B

Systemmisuse

CSystemanomalies

DOperationalanomalies

第3題IntrusionDetectionSystem(IDS)isareasonablecomplementto()tohelpthesystemagainstnetworkattacks.

ASwitches

BRouters

CServers

DFirewalls

第4題

IPS(IntrusionPreventionSystem)isabase()products,itisbasedon()attackidentificationmatching

AApplicationlayer,featurelibrary

BNetworklayer,protocols

CApplicationlayer,protocols

DNetworklayer,featurelibrary

第5題IDS,alsoknownasIntrusionDetectionSystem,isinstalledonthetrunkofthenetwork.

Chaptertest第1題Themethodsofportscanningmainlyinclude:()

AFullscan

BSemi-openscanning

CCovertscanningDVulnerabilityscanning

正確答案:ABCD第2題TypesofcomputerbackdoorTrojanhorsesinclude:()

ATrojanhorses

BRootKit

CScriptingbackdoors

DHiddenAccounts

正確答案:ABCD第3題TechnicalrealizationofIPspoofingandprecautionsagainstspoofingattacksinclude:()

AProductsusinganti-IPspoofingfunction

BCloselymonitoringthenetworkandalertingtoattacks

C

Useofup-to-datesystemsandsoftwaretoavoidguessingsessionserialnumbers

DStrictlysetroutingpolicy:rejectpacketsfromtheInternetthataredeclaredtooriginatefromalocaladdress

正確答案:ABCD第4題Preventivemeasuresagainstdenial-of-serviceattacksinclude:()

ASecurityenhancements

BResourcecontrol

CSafetyequipment

DOperators,publicsecuritydepartments,expertteams,etc.

正確答案:ABCD第5題Typicaldenial-of-serviceattacksinclude:()

APingofdeathBSYNFlood

CUDPFlood

DTeardrop

正確答案:ABCDChaptertest第1題VPNrefersto()

AVirtualprivatenetworks

BVirtualprotocolnetworks

CVirtualpacket-filteringnetworks

第2題TheencryptionmeansofVPNis().

AFirewallswithencryption

BRouterswithencryption

CEachhostwithintheVPNencryptsitsinformationaccordingly

DSeparateencryptiondevices

第3題WhattypeofVPNisestablishe

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論