Information Security Technology 10 Software Protection Technology Test Volume 2

Information Security Technology 10 Software Protection Technology Test Volume 2


Dingdu! Here is the compilation of Xiao Ah Woo's study course materials. A good memory is not as good as a bad pen. Today is also a day to make progress. Let's advance together!
Insert picture description here

1. True or false

1. [This question belongs to Lecture 10] The unpacking accuracy (successful unpacking) of general unpacking software is often higher than that of dedicated unpacking software.

我的答案: √

2. [This title belongs to Lecture 10] Patch technology is mainly used to repair software vulnerabilities and update software functions. Memory patches are easier to implement than file patches.

我的答案: ×

3. [This question belongs to Lecture 10] Generally speaking, the size of the program will become smaller after shelling, and its size will become larger after shelling.

我的答案: √

4. [This title belongs to Lecture 10] Softdog uses hardware encryption technology, which can effectively protect software security. There is currently no cracking method for softdog.

我的答案: ×

5. [This question belongs to Lecture 10] If an exe program is packed, there is no way to use Resource Hacker to obtain resources from it.

我的答案: ×

6. [This question belongs to Lecture 10] Software watermarking belongs to the category of digital watermarking.

我的答案: √

7. [This title belongs to Lecture 10] Software watermarking can be used to detect and detect illegal use of software modules.

我的答案: √

8. [This title belongs to Lecture 10] Software watermark can be used to judge whether the software is genuine software, and it can also be used to prove the ownership of the software.

我的答案: √

9. [This question belongs to Lecture 10] When a software cracking attempt is detected, the software should immediately take self-destruct measures to prevent the software from being cracked.

我的答案: ×

10. [This title belongs to Lecture 10] In the software protection process, in order to avoid the encryption algorithm from being cracked by an attacker, it is best to design the encryption algorithm by yourself and avoid the algorithm being disclosed.

我的答案: ×

Ending!
More course knowledge learning records will come later!

就酱,嘎啦!

Insert picture description here

Note:
Life is diligent, nothing is gained.

Guess you like

Origin blog.csdn.net/qq_43543789/article/details/109089706