网络安全与病毒认证8

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

一.单选题:
1. 对计算机网络的最大威胁是什么?
A.黑客攻击
B.计算机病毒的威胁
C.企业内部员工的恶意攻击
D.企业内部员工的恶意攻击和计算机病毒的威胁
标准答案:d考生答案:c本题分数:2.5本题得分:0
2. 黑客搭线窃听属于哪一类风险?
A.信息存储安全
B.信息传输安全
C.信息访问安全
D.以上都正确
标准答案:b考生答案:b本题分数:2.5本题得分:2.5
3. 安全的网络必须具备哪些特征?
A.保密性
B.完整性
C.可用性
D.可控性
E.以上都正确
标准答案:e考生答案:e本题分数:2.5本题得分:2.5
4. 可被授权实体访问并按需求使用的特性,即当需要时能否存取和访问所需的信息的特性是指信息的?
A.保密性
B.完整性
C.可用性
D.可控性
E.以上都正确
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
5. 对信息的传播及内容具有控制能力的特性是指信息的?
A.保密性
B.完整性
C.可用性
D.可控性
E.以上都正确
标准答案:d考生答案:d本题分数:2.5本题得分:2.5
6. 网络安全漏洞可以分为各个等级,B级漏洞表示?
A.允许本地用户提高访问权限,并可能使其获得系统控制的漏洞
B.允许恶意入侵者访问并可能会破坏整个目标系统的漏洞
C.允许用户中断、降低或阻碍系统操作的漏洞
D. 以上都不正确
标准答案:a考生答案:a本题分数:2.5本题得分:2.5
7. 信息收集是网络攻击的______
A.第一步
B.第二步
C.第三步
D.最后一步
标准答案:a考生答案:b本题分数:2.5本题得分:0
8. 网络攻击的主要类型有哪些?
A.拒绝服务
B.侵入攻击
C.信息盗窃
D.信息篡改
E.以上都正确
标准答案:e考生答案:e本题分数:2.5本题得分:2.5
9. 在网络攻击的多种类型中,以遭受的资源目标不能继续正常提供服务的攻击形式属于哪一种?
A.拒绝服务
B.侵入攻击
C.信息盗窃
D.信息篡改
E.以上都正确
标准答案:a考生答案:a本题分数:2.5本题得分:2.5
10. 电子邮件的发件人利用某些特殊的电子邮件软件在短时间内不断重复地将电子邮件寄给同一个收件人,这种破坏方式叫做______。
A.邮件病毒
B.邮件炸弹
C.特洛伊木马
D.逻辑炸弹
标准答案:b考生答案:b本题分数:2.5本题得分:2.5
11. 计算机病毒的特征
A.隐蔽性
B.潜伏性,传染性
C.破坏性
D.可触发性
E.以上都正确
标准答案:e考生答案:e本题分数:2.5本题得分:2.5
12. 下列各项中,哪一项不是文件型病毒的特点。
A.病毒以某种形式隐藏在主程序中,并不修改主程序
B.以自身逻辑部分取代合法的引导程序模块,导致系统瘫痪
C.文件型病毒可以通过

检查主程序长度来判断其存在
D.文件型病毒通常在运行主程序时进入内存
标准答案:b考生答案:d本题分数:2.5本题得分:0
13. 在使用者和各类系统资源间建立详细的授权映射,确保用户只能使用其授权范围内的资源,并且通过访问控制列表(ACL: Access Control List)来实现,这种技术叫做____。
A.资源使用授权
B.身份认证
C.数字签名
D.包过滤
E.以上都不正确
标准答案:a考生答案:d本题分数:2.5本题得分:0
14. 有一主机专门被用作内部网和外部网的分界线。该主机里插有两块网卡,分别连接到两个网络。防火墙里面的系统可以与这台主机进行通信,防火墙外面的系统(Internet上的系统)也可以与这台主机进行通信,但防火墙两边的系统之间不能直接进行通信,这是_______的防火墙。
A.屏蔽主机式体系结构
B.筛选路由式体系结构
C.双网主机式体系结构
D.屏蔽子网(Screened SubNet)式体系结构
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
15. 最大的优点是对用户通明,并且隐藏真实IP地址,同时解决合法IP地址不够用的问题。这种防火墙技术称为_______。
A.包过滤技术
B.状态检测技术
C.代理服务技术
D.以上都不正确
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
16. 关于防火墙的不足,不正确的是:
A.防火墙不能防备病毒
B.防火墙对不通过它的连接无能为力,防火墙不能防备新的网络安全问题
C.防火墙不能防备内部人员的攻击
D.防火墙限制有用的网络安全服务
E.不能限制被保护子网的泄露
标准答案:e考生答案:c本题分数:2.5本题得分:0
17. 下面有关入侵检测系统的说法,哪个不正确。
A.主要是监控网络和计算机系统是否出现被入侵或滥用的征兆
B.假如说防火墙是一幢大楼的门锁,那入侵监测系统就是这幢大楼里的监视系统
C.IDS系统以前台进程的形式运行
D.能防备内部人员的攻击
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
18. 入侵监测的主要技术有:
A.签名分析法
B.统计分析法
C.数据完整性分析法
D.以上都正确
标准答案:d考生答案:d本题分数:2.5本题得分:2.5
19. 企业在选择防病毒产品时,选择单一品牌防毒软件产品的好处是什么?
A.划算的总体成本
B.更简化的管理流程
C.容易更新
D.以上都正确
标准答案:d考生答案:d本题分数:2.5本题得分:2.5
20. 针对操作系统的漏洞作更深入的扫描,是_____型的漏洞评估产品。
A.数据库
B.主机型
C.网络型
D.以上都不正确
标准答案:b考生答案:b本题分数:2.5本题得分:2.5
21. 下列说法正确的是_____。
A.对安全防

护工作重视的领导是安防工作顺利推进的主要动力
B.有强烈安全防护意识的员工是企业安防体系得以切实落实的基础
C.先进的技术+完善的管理
D.好的安防体系是人、制度、技术的结合
E.以上都正确
标准答案:e考生答案:e本题分数:2.5本题得分:2.5
22. 建立安全的企业网络一般分为_____步。
A.1
B.3
C.5
D.7
E.9
标准答案:d考生答案:e本题分数:2.5本题得分:0
23. _____是建立安防体系过程中极其关键的一步,它连接着安防重点和商业需求。它揭示了关键性的商业活动对资源的保密性、集成性和可用性等方面的影响。
A.安全风险分析
B.网络系统现状
C.安全需求与目标
D.安全方案设计
E.安全解决方案
标准答案:a考生答案:a本题分数:2.5本题得分:2.5
24. 下列说法不正确的是_____。
A.安防工作永远是风险、性能、成本之间的折衷
B.网络安全防御系统是个动态的系统,攻防技术都在不断发展。安防系统必须同时发展与更新
C.系统的安全防护人员必须密切追踪最新出现的不安全因素和最新的安防理念,以便对现有的安防系统及时提出改进意见
D.建立100%安全的网络
E.安防工作是循序渐进、不断完善的过程
标准答案:d考生答案:d本题分数:2.5本题得分:2.5
25. For MS Word macro viruses, when an infected document is opened, it will usually copy its macro codes unto what file (Also referred to as the default template)?
A.DEFAULT.TEM
B.NORMAL.DOT
C.WIN.INI
D.AUTOEXEC.BAT
E.None of the above
标准答案:b考生答案:b本题分数:2.5本题得分:2.5
26. GIF and JPG image files have not found that be infected with viruses.
A.TRUE
B. FALSE
标准答案:a考生答案:a本题分数:2.5本题得分:2.5
27. What tool may be used for any MS office files, including MS Word documents, MS Excel spreadsheets, and MS Powerpoint presentations to check for possible macro virus infections?
A.FDISK.EXE
B.DFVIEW.EXE
C.REGEDIT.EXE

标准答案:b考生答案:c本题分数:2.5本题得分:0
28. Trojans differ from traditional viruses in that they do not attempt to reproduce themselves like traditional viruses do.
A.TRUE
B. FALSE
标准答案:a考生答案:a本题分数:2.5本题得分:2.5
29. Which statement of W97m_Melissa virus is correct?
A.This virus will format your hardisk
B.The virus will access the Outlook client address book and send to each recipient in the address book (50 recipients) a new email
C.This virus can be activated if the email is viewed through the "Preview Pane." In Microsoft Outlook, it can be activated automatically if the infected mail is "opened."
D.It comes in the form of a Windows PE executable called prettyorg.exe, via email and works under Windows 95/98/NT. It is a memory resident pro

gram that sends itself to all users in the address book of the infected computer
标准答案:b考生答案:b本题分数:2.5本题得分:2.5
30. Which statement of VBS_BubbleBoy virus is correct?
A.This virus will format your hardisk
B.The virus will access the Notes client address book and send to each recipient in the book (50 recipients) a new email
C.This virus can be activated if the email is viewed through the "Preview Pane." In Microsoft Outlook, it can be activated automatically if the infected mail is "opened."
D.It comes in the form of a Windows PE executable called prettyorg.exe, via email and works under Windows 95/98/NT. It is a memory resident program that sends itself to all users in the address book of the infected computer.
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
31. Which factor(s) explain why computer networks have become more vulnerable to virus-related attacks?
A.Most networks are not protected by antivirus software
B.Many new devices that are available on the market can carry undetected viruses and spread them when connected to a network
C.The large numbers of new devices, operating systems, Web services, and online applications allows greater access to network
D.A and B
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
32. Which statement defines a dropper?
A.They consume memory resources by replicating themselves.
B.They are capable of destroying data files and damaging hardware.
C.They trick the user into performing some harmful activity.
D.They have no purpose except to release other malware
标准答案:d考生答案:d本题分数:2.5本题得分:2.5
33. Which type of malware recruits servers located throughout the Internet to flood a target server with constant traffic?
A.Worms
B.Backdoor Trojans
C.DDoS Programs
D.DoS Programs
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
34. Which statement explains why the new SQL Slammer worm is so unusual?
A.It infects Web servers instead of desktop PCs.
B.It locates email addresses and sends infected email attachments.
C.It is the fastest worm ever discovered
D.It spreads from computer to another by using port 445.
标准答案:c考生答案:c本题分数:2.5本题得分:2.5
35. What made the CodeRed worm unique from earlier computer threats?
A.It attacks Web servers instead of desktop PCs.
B.It replicates itself.
C.It executes hostile code once it is resident in a target computer.
D.It creates multiple distributed denial-of-service attacks.
标准答案:a考生答案:c本题分数:2.5本题得分:0
36. While you are working on a document on Microsoft Word, you notice that your system slightly slows down in performance. Is it correct to assume that a virus is present on your system?
A.Yes. System slowdown is a strong indication of virus infection
B.No. The system slowdown may be attributed to other factors,

not necessarily virus infection.
C.Yes. A malware is probably using up too much memory space.
D.No. A virus cannot be present because my antivirus software is enabled and running
标准答案:b考生答案:b本题分数:2.5本题得分:2.5
37. What is the default port number used by PC-cillin 2003 for POP3 Scanning?
A.120
B.110
C.25
D.21
E.80
标准答案:b考生答案:a本题分数:2.5本题得分:0题目解析:The port number is 110.
38. PC-cillin has quarantined several infected files. If the user wants to restore all these files, how would he perform this?
A.Disable real-time scan, go to the Quarantine section in the Program console, click on Restore All button
B.Disable Real-time scan, go to the Quarantine section in the Program console, Select all entries in the list and click on Restore button
C.Disable the Real-time scan, select an entry from the list and press Alt-R
D.Disable the Real-time scan, select an entry from the list and click on Restore button
E.C or D
标准答案:e考生答案:e本题分数:2.5本题得分:2.5题目解析:The user can disable the Real-time scan, select an entry from the list and press Alt_r or click on Restore.
39. Would Intelligent Update work when user is logged in as a POWER user or a user in a Windows 2000 environment?
A.Yes, by default, Intelligent update would work in this scenario
B.Yes, but the user must edit the permissions in the registry
C.Intelligent Update would work only when logged in as power user and not as ordinary user
D.No
E.Intelligent Update would work only when logged in as an ordinary user and not as power user
标准答案:d考生答案:e本题分数:2.5本题得分:0题目解析:Intelligent Update will not work in either case.
40. What is the Personal Firewall DEFAULT security level on PC-cillin 2003?
A.Ultra
B.High
C.Medium
D.Low
E.Disabled
标准答案:c考生答案:e本题分数:2.5本题得分:0题目解析:The default setting is medium.

相关文档
最新文档