First, question and answer:
1. What is the theme of the first National Cyber Security Publicity Week in China this year?
A: Build network security together and share network civilization.
2. What is official website of Luoding Vocational and Technical College?
The answer is: www.niubb.net and www.niubb.net.
3. What is the domain name of the government and public welfare organization of Luoding Vocational and Technical College?
Answer: Luoding Vocational and Technical College. Public welfare.
4. How to keep your information and property safe when using CRP digital campus, campus card and other information systems for the first time?
Answer: Enter the information system to change the password and set it as a complex password.
5. What is the most outstanding advantage of computer network?
Answer: Sharing resources.
6. What are the common threats to information security?
Answer: Common threats include unauthorized access, information disclosure, data integrity violation, denial of service attack and malicious code.
7. What is the fundamental condition to solve the Internet security problem?
A: Improve the network moral quality of netizens in the whole society.
8. What is a phishing website?
Answer:? Phishing website? It is a kind of online fraud, which means that criminals use various means to fake the URL address and page content of the real website, or use the loopholes in the server program of the real website to insert dangerous HTML codes into some pages of the website to defraud users of personal information such as bank or credit card accounts and passwords.
9. What is network security?
Answer: Network security means that the hardware and software of the network system and the data in the system are protected, which will not be destroyed, changed or leaked due to accidents or malicious reasons. The system can run continuously and reliably without interruption of network services.
10, what is Troy?
A: Trojan horse is a malicious remote control software. Trojans are generally divided into clients.
(client) and server (server). The client is the console of various commands used locally, and the server is run by others. Only the computer that has run the server can fully control it. Trojans don't infect files like viruses.
1 1. What's the back door?
A: Backdoor refers to a way to gain access to a program or system by bypassing security control.
12. What are the preventive measures against network hackers?
Answer: ① Select a security password; ② Passwords should not be stored in the system in plain text; ③ Establish an account locking mechanism; ④ Implement access control; ⑤ Ensure data security.
13. What are the sources of network viruses?
A: E-mail attachments, e-mail, network servers and file sharing.
14. If an ARP attack occurs inside the LAN, what two sentences will appear?
Answer: 1. Keep popping up? Does the ` (wrong) (wrong) (wrong) segment address of this machine conflict with the (wrong) (wrong) segment address in the network? Dialog box of. 2. The computer can't surf the Internet normally, and there are symptoms of disconnection.
15. What is the purpose of controlling the use of USB interface?
Answer: 1, network security 2, information confidentiality.
16. What is IP spoofing?
A: An attacker can cheat the trust of the target host by pretending to be a trusted source IP address.
17. What are the security problems of e-mail?
1. Spam includes advertising mail, harassing mail, chain mail and reactionary mail. Spam will increase the network load, affect the network transmission speed and occupy the space of the mail server. 2. Fraud emails usually refer to those with malicious fraud emails. By taking advantage of the rapidity and cheapness of e-mail, the sender can quickly fool a large number of victims. 3. Mail bomb refers to the act of sending a large number of mails to the same mailbox in a short time. When the mailbox can't bear it, it will collapse. Most viruses spread by e-mail are attached to e-mail. When the recipient opens the attachment, the virus will query his address book, send a letter to all or part of the above people, and put himself in the attachment, thus continuing to spread and spread.
18. What is a network worm?
A: A network worm is an intelligent and automated attack program or code, which integrates network attack, cryptography and computer virus technology and can run without the intervention of computer users.
19. What are the characteristics of network worms?
A: It has the characteristics of virus, infectivity, concealment and destructiveness. It can spread actively through the network without using file parasitism, which is easy to cause network congestion; With intelligence, automation and high technology;
20. What are the basic functions of a firewall?
Answer: 1 Filter data entering and leaving the network; 2. Manage the access behavior inside and outside the network; 3. Block some prohibited businesses; 4. Record information and activities inside and outside the network; 5. Respond to cyber attacks and call the police.
2 1. What are the four elements that an Internet e-commerce system must ensure network security?
Answer: 1 confidentiality of transmitted data; 2 data integrity; 3. The authenticity of the identity of the parties to the transaction; 4. Non-repudiation of transactions;
2 1. What's the difference between a worm and a general virus?
A: Existence form: Common viruses are stored in files, while worm viruses are stored in independent programs; Infection mechanism: common virus runs on the host program, and worms will take the initiative to attack;
Infection target: Common viruses infect local files and worms infect computers all over the network.
22. What is the motive of hacking?
Answer: 1. Curiosity 2. Challenge. 3. Revenge mentality 4. Economic benefits. Political purpose. information acquisition
23. What is password cracking and what are the methods?
Answer: By guessing or directly destroying the password verification mechanism of the original password, the final effect is the same as that of password analysis, or the corresponding authority of the password.
General password cracking can be roughly divided into the following categories.
1) Use software to try passwords indefinitely. 2) Bypass the password authentication mechanism. 3) If the password is encrypted, please use an alternate password instead of the original password.
24. What's the difference between backdoor programs and computer viruses?
A: Backdoor programs, also known as Trojan horses, are used to lurk in users' computers to collect information or facilitate hackers to enter. The biggest difference between backdoor programs and computer viruses is that backdoor programs don't necessarily copy themselves, that is, backdoor programs don't necessarily? Infection? Other computers.
25. What is the development trend of hacking technology?
Answer: (1) The automation degree and attack speed of network attacks are constantly improving; (2) The attack tools are becoming more and more complex; (3) Hackers use security vulnerabilities faster and faster; (4) Firewalls are increasingly infiltrated by attackers; (5) The asymmetry of security threats is increasing; (6) Attacking the network infrastructure is more and more destructive.
26. What is a loophole?
A: A vulnerability is a defect in the specific implementation of hardware, software, protocols or system security policies, which enables an attacker to access or destroy the system without authorization.
27. What are the main security threats facing the network?
The security threats faced by the network can be divided into two types: one is the threat to network data; The second is the threat to network equipment. To sum up, the main threats include the following aspects: 1) non-human data loss, equipment failure and line blockage caused by natural forces. 2) Data loss due to the operator's artificial but unintentional error. 3) Malicious attacks and intrusions from external and internal personnel.
28. What are the advantages of IPv6 over IPv4?
Advantages of IPv6: First, IPv6 solves the problem of IP address shortage; Secondly, IPv6 has greatly improved many imperfections in the IPv4 protocol, made better improvements in network confidentiality and integrity, and made new guarantees in controllability and non-repudiation.
29. What is the general process of computer virus infection?
Answer: 1) Judge whether the infected target (file) meets the infection conditions (whether it has been infected).
2) If the target meets the infection conditions, link the virus to the characteristic position of the infected target and store it in the disk.
3) Continue to monitor the operation of the system and look for new infectious targets.
30. What are the network security services?
;