2020 Network Security NISP Level 1 (Mock 7)

2020 National Information Security Level Examination NISP Level 1 (Mock Question 7)


2020 College Students’ Network Security Knowledge Finals NISP Level 1 Simulation Questions (07)

NISP Level 1 Multiple Choice Questions (latest) (2 points for each question, a total of 50 questions for this question, a total of 100 points, 60 points pass)

Information content security is a requirement of information security at the political, legal, and moral levels. The research content in the field of information content security mainly includes ()

A. Acquisition, analysis and identification of information content; B. Information content management and control; C. Legal protection of information content security; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

Information confrontation is a comprehensive technical measure taken to weaken and destroy the effectiveness of the other party's electronic information equipment and information, and to ensure the normal performance of one's own electronic information equipment and information. The main research contents are ()

A. Communication countermeasures; B. Radar countermeasures; C. Computer network countermeasures; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

Access control theory is the unique theoretical basis of cyberspace security. The following belong to access control ()

A. Password technology; B. Identity authentication; C. Information hiding; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

There are many methods of risk assessment, which can be summarized into three categories: quantitative risk assessment methods, qualitative risk assessment methods, and qualitative and quantitative assessment methods. The use of quantitative indicators to evaluate risk is the () evaluation method

A. Qualitative; B. Quantitative; C. Combination of qualitative and quantitative; D. None of the above

The correct answer is: B Your answer is: B Score for this question: 2

The Internet Control Message Protocol ICMP allows routers to report errors and provide reports on abnormal conditions. Its full English name is (). 

A.Internet Control Messag Protocol;B.Internet Control Message Protocol;C.Internet Contract Message Protocol;D.Internet Control Message Prototype

The correct answer is: B Your answer is: B Score for this question: 2

As a key technology of information security, cryptography mainly includes three very important aspects: confidentiality, integrity and availability. () Is a feature to ensure that information is only accessed by legitimate users, and not to be disclosed to or used by unauthorized users, entities or processes.

A. Confidentiality; B. Integrity; C. Availability; D. None of the above

The correct answer is: A Your answer is: A Score for this question: 2

As a key technology of information security, cryptography mainly includes three very important aspects: confidentiality, integrity and availability. () Means that all resources can only be modified in an authorized manner, that is, the characteristic that information cannot be changed without authorization.

A. Confidentiality; B. Integrity; C. Availability; D. None of the above

The correct answer is: B Your answer is: B Score for this question: 2

The message authentication code MAC is a public function of the message content and secret key, and its full English name is ().

A.Message Authentication Code;B.Messag Authentication Code;C.Message Authentication Date;D.Messag Authentication Code

The correct answer is: A Your answer is: A Score for this question: 2

The collection of the various layers of the computer network and its protocols, that is, the precise definition of the functions that the computer network and its components should complete, is called ().

A. Network protocol; B. Computer network; C. Computer network architecture; D. Computer network standard

The correct answer is: C Your answer is: C Score for this question: 2

The following statement about the serial password is incorrect ()

A. Serial ciphers individually encrypt each plaintext bit; B. Because serial ciphers are small and fast, they are very suitable for applications with limited computing resources; C. The encryption and decryption of serial ciphers use the same function; D. In real life Serial ciphers are more widely used than block ciphers, such as Internet security

The correct answer is: D Your answer is: D Score for this question: 2

CIDR often uses a notation such as 123.11.48.0/20, that is, add a slash "/" after the IP address, and then write the number of bits occupied by the network prefix under the "/". The number of bits occupied by the network prefix implies Point out that the mask of the IP address 123.11.48.0 is ()

A.255.255.255.0;B.255.255.240.0;C.255.255.192.0;D.255.255.0.0

The correct answer is: B Your answer is: B Score for this question: 2

APT Advanced Persistent Threat Attack is a specific attack based on commercial or political purposes. It uses a series of targeted attacks to obtain important information about a certain block or even a country. Its full English name is ().

A.Advanced Persistent Threat;B.Advanced Persistent Thread;C.Advanced Persist Threat;D.Advanced Persist Thread

The correct answer is: A Your answer is: A Score for this question: 2

The general APT attack process can be detailed into 5 steps: intelligence collection, defense breakthrough, channel establishment, horizontal penetration, information collection and outreach. After the attacker breaks through the line of defense and takes control of the employee’s computer, which step is the establishment of a command and control channel between the employee’s computer and the intrusion server?

A. Intelligence collection; B. Defense line breakthrough; C. Channel establishment; D. Horizontal penetration

The correct answer is: C Your answer is: C Score for this question: 2

At present, my country's network security problems are becoming increasingly prominent. Which of the following are the main factors restricting my country's improvement of network security defense capabilities?

A. Lack of independent computer network and software core technology; B. Poor security awareness is the bottleneck of network security; C. Defects and deficiencies of the operation management mechanism restrict the strength of security prevention; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

Safety equipment refers to the devices and equipment used by enterprises to control hazards and harmful factors within the safe range, and reduce, prevent and eliminate hazards in production and business activities. Which of the following options is not a safety equipment?

A. Firewall; B. VPN; C. IDS; D. Hub

The correct answer is: D Your answer is: D Score for this question: 2

Which of the following options is the attacker's attack strategy?

A. Information collection; B. Analysis of system security weaknesses; C. Simulated attacks; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

Trojan (Trojan), also known as Trojan virus, refers to the control of another computer through a specific program. Which of the following is not a common type of Trojan horse?

A. DOS attack type; B. password sending type; C. green security type; D. keylogger type

The correct answer is: C Your answer is: C Score for this question: 2

Viruses and Trojan horses are both man-made programs, and both belong to computer viruses. The following statements about viruses and Trojans are wrong ()

A. Viruses and Trojan horses are easy to distinguish clearly; B. Viruses and Trojan horses can generally be collectively referred to as malicious programs or malware; C. Viruses have a certain degree of destructiveness, and Trojan horses tend to steal silently; D. Viruses have self-propagation Sex, which is capable of self-replication, but Trojan horses don’t have this

The correct answer is: A Your answer is: A Score for this question: 2

Before the advent of the mobile Internet, the two most important methods of attacking browsers were hacking and phishing. Which of the following statements is correct ()

A. Trojan horse program is to plant a Trojan horse program in a certain page, which causes the user to download the Trojan horse while browsing the page, and then use the Trojan horse to steal user information or data; B. The phishing page is almost the same as the page the user wants to browse. Ordinary users will enter their username and password on the phishing website without paying attention, so that the phisher can directly obtain user information; C. Both are WEB attack methods, but the hacking is based on the original page. It was done on the newly produced fake page; D. All of the above are correct

The correct answer is: D Your answer is: D Score for this question: 2

Phishing websites usually refer to websites that pretend to be banks and e-commerce to steal private information such as bank account numbers and passwords submitted by users. The essence is that the content has ()

A. Integrity; B. Confidentiality; C. Deceptiveness; D. Non-repudiation

The correct answer is: C Your answer is: C Score for this question: 2

Which of the following is a common web attack?

A. SQL injection; B. Cross-site scripting; C. Cookie attack; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

Denial of service attack DOS is an attacker trying to stop the target machine from providing services. It is one of the attack methods commonly used by hackers. Which of the following is a DOS attack method?

A. Service overload; B. Information grounding; C. Message flow; D. All of the above

The correct answer is: D Your answer is: D Score for this question: 2

The main purpose of computer interconnection is

A. Develop network protocols; B. Combine computer technology with communication technology; C. Centralized computing; D. Resource sharing

The correct answer is: D Your answer is: D Score for this question: 2

INTERNET was originally created for

A. Politics; B. Economy; C. Education; D. Military

The correct answer is: D Your answer is: D Score for this question: 2

In the local area network, MAC refers to

A. Logical link control sublayer; B. Medium access control sublayer; C. Physical layer; D. Data link layer

The correct answer is: B Your answer is: B Score for this question: 2

The data unit exchanged between adjacent layers is called service data unit, and its abbreviation is

A.SDU ; B.IDU ; C.PDU ; D.ICI

The correct answer is: A Your answer is: A Score for this question: 2

Generally speaking, users go online through the Internet service provider, whose English abbreviation is

A.IDC;B.ICP;C.ASP;D.ISP

The correct answer is: D Your answer is: D Score for this question: 2

Among the following four transmission media, the one with the widest bandwidth and strongest anti-interference ability is

A. Twisted pair; B. Wireless channel; C. Coaxial cable; D. Optical fiber

The correct answer is: D Your answer is: D Score for this question: 2

The IP protocol is connectionless, and its information transmission method is

A. Point to point; B. Datagram; C. Broadcast; D. Virtual circuit

The correct answer is: B Your answer is: B Score for this question: 2

The routing protocol provides routers with shared routing information needed for the best path in the network. The routing protocol is located in

A. Physical layer; B. Data link layer; C. Network layer; D. Application layer

The correct answer is: C Your answer is: C Score for this question: 2

The first computer network in the world is

A.ARPANET;B.INTERNET;C.CHINANET;D.CERNET

The correct answer is: A Your answer is: A Score for this question: 2

Among Internet devices, the interconnected devices that work at the physical layer are

A. Hub; B. Bridge; C. Router; D. Switch

The correct answer is: A Your answer is: A Score for this question: 2

The data link layer is the second layer in the OSI reference model, between the physical layer and the network layer. The following are not part of the data link layer function

A. Frame delimitation function; B. Circuit management function; C. Error detection function; D. Link management function

The correct answer is: B Your answer is: B Score for this question: 2

The routing protocol provides routers with shared routing information needed for the best path. The following are not part of the routing protocol

A.RIP;B.ICMP;C.BGP;D.OSPF

The correct answer is: B Your answer is: B Score for this question: 2

The three basic elements that a communication system must have are

A. Terminals, cables, computers; B. Signal generators, communication lines, signal receiving equipment; C. Sources, communication media, and sinks; D. Terminals, communication facilities, receiving equipment

The correct answer is: C Your answer is: C Score for this question: 2

The full name of the UDP protocol is the user datagram protocol. It is used to process data packets in the network like the TCP protocol. It is a connectionless protocol. The UDP protocol works in

A. Application layer; B. Transport layer; C. Network interconnection layer; D. Network interface layer

The correct answer is: B Your answer is: B Score for this question: 2

In the following protocol, the one used for email transmission control is

A.SNMP;B.SMTP;C.HTTP;D.HTML

The correct answer is: B Your answer is: B Score for this question: 2

At the same time on the same channel, the communication method capable of two-way data transmission is

A. Simplex; B. Half-duplex; C. Full-duplex; D. None of the above three

The correct answer is: C Your answer is: C Score for this question: 2

In OSI, in order to achieve effective and reliable data transmission, the transmission operation must be strictly controlled and managed. The level of completion of this work is

A. Physical layer; B. Data link layer; C. Network layer; D. Transport layer

The correct answer is: B Your answer is: B Score for this question: 2

Frame relay is a kind of bearer service that provides two-way transmission of user information flow between user and network interface and keeps the information sequence unchanged. What type of network is frame relay network? 

A. Wide area network; B. Local area network; C. ATM network; D. Ethernet

The correct answer is: A Your answer is: A Score for this question: 2

What is the default TCP port number for FTP service?

A.80;B.25;C.23;D.21

The correct answer is: D Your answer is: D Score for this question: 2

What is wrong in the following description of 100BASE-T

A. The data transmission rate is 100Mbit/S; B. The signal type is baseband signal; C. It adopts category 5 UTP, and its maximum transmission distance is 185M; D. Supports shared and switched networking modes

The correct answer is: C Your answer is: C Score for this question: 2

Among the following four www URLs, which one does not meet the www URL writing rules?

A.www.163.com ; B.www.nk.cn.edu ; C.www.863.org.cn ; D.www.tj.net.jp

The correct answer is: B Your answer is: B Score for this question: 2

The basis for the communication between different networks and different types of computers on the Internet is

A.HTTP;B.IPX/SPX;C.X.25;D.TCP/IP

The correct answer is: D Your answer is: D Score for this question: 2

The main function of the hub is to regenerate, reshape, and amplify the received signal to expand the transmission distance of the network while concentrating all nodes on the node centered on it. The following description of the hub is correct

A. The hub cannot extend the operable distance of the network; B. The hub cannot filter network traffic; C. The hub cannot become a central node; D. The hub cannot amplify weakened signals

The correct answer is: B Your answer is: B Score for this question: 2

The first message that the DHCP client sends when applying for an IP address lease is

A.DHCP discover;B.DHCP offer ;C.DHCP request ;D.DHCP positive

The correct answer is: A Your answer is: A Score for this question: 2

Infectivity is the essential attribute of computer viruses. Viruses can be classified according to their parasitic location or infected objects. According to the parasitic method of computer viruses, what is not a virus type is ()

A. Embedded virus; B. Guide virus; C. File virus; D. Compound virus

The correct answer is: A Your answer is: A Score for this question: 2

System vulnerabilities can be exploited by criminals to attack or control the entire computer through network implantation of Trojan horses, viruses, etc., steal important data and information in the computer, or even damage the system. The following description about the vulnerability is incorrect ()

A. Through security software scanning, all vulnerabilities can be found; B. A vulnerability is a system state or condition, which is generally manifested as a deficiency or defect; C. A vulnerability may affect a wide range of software and hardware devices; D. Vulnerabilities are usually Caused by incorrect system design such as incorrect logic

The correct answer is: A Your answer is: A Score for this question: 2

Wireless wide area network is a communication method that connects local area networks with extremely dispersed physical distances. Wireless WAN for data communication needs to use ()

A. Public data network; B. Optical fiber; C. Communication satellite; D. Telephone line

The correct answer is: C Your answer is: C Score for this question: 2

Wireless local area network is a very convenient data transmission system. The hardware equipment includes wireless network card, wireless AP and wireless antenna. The role of AP is ()

A. Wireless access; B. Routing selection; C. Business management; D. User authentication

The correct answer is: A Your answer is: A Score for this question: 2

Guess you like

Origin blog.csdn.net/adminkeys/article/details/109274502