Network Security Job Interview Questions

1. What are the "oldest three" in information security? (Single-choice question, 5 points)
A. Firewall, intrusion detection, scanning
B. Firewall, scanning, anti-virus
C. Intrusion detection, scanning, anti-virus
D. Firewall, intrusion detection, anti-virus
2, data confidentiality The basis of the security service is ( Single-choice question, 5 points)
A. Digital signature mechanism
B. Encryption mechanism
C. Access control mechanism
D. Data integrity mechanism
3. Among the following authentication methods, the most commonly used authentication method. (Single-choice question, 5 points)
A. Authentication based on account name/password
B. Authentication based on PKI
C. Authentication based on digest algorithm
D. Authentication based on database
4. When accessing a certain page resource of a web site does not exist, what is the HTTP status code that will appear? (
Single- choice question, 5 points) A.200
B.404
C.201
D.302
5. If a website has CSRF vulnerabilities, what can be done through CSRF vulnerabilities? (Single-choice question, 5 points) 
A. Obtain the personal data information
registered by the website user B. Modify the personal data information registered by the
website user C. Use the identity of the website user to post information
D. All of the above can be
6, a website exists order Execution vulnerability, because the server cannot connect to the external network, what method can we use to upload files to the server (multiple choice question, 5 points)
A.Vbs
B.powershell
C.Echo
D.ftp
7. 47. By default, which version of Windows can capture LM hash (multiple choice, 5 points)
A.windowsXP
B.windows server 2008
c.windows Vista
D.windows7
8. When testing sq[injection, Which of the following is not advisable (multiple choice question, 5 points)
A.?id=l or 1=1
B.?id=2-1
C.?id=l+1
D. ?id=l and l=l ?id=l and 1=1
9, 49.Mysq[If the database uses the [oad_fi[e〇 function to read operating system files, the required permissions are (single-choice questions, 5 points)
A.Write
B.LoadFile
C.File
D.Read
10, 50. SQLSERVER database authentication support mode is (single-choice question, 5 points)
A.SQL authentication mode
B.windows and SQL mixed authentication mode
c.windows authentication mode
D.radius authentication mode
11 、51. When conducting network security requirements analysis, should it be discarded? (Single-choice question, 5 points)
A. Integrated awareness
B. Risk awareness
C. Balance awareness
D. Absolute awareness
12.52. Among the following network security technologies, which of the following network security technologies can provide real-time protection against internal attacks, external attacks, and misoperations? (Single-choice question, 5 points)
A. Firewall
B. port scanning
C. intrusion detection
D. antivirus software,
13, 53. The following statement on the attack cc errors (multiple choice, 5 points)
defects A.cc attack used when tcp protocol
B.cc need to use a proxy attack
C.cc attack is difficult to gain control of the target machine.
D.cc attack was first popular in foreign countries.14,54
. I got a websheU under windows. I want to check the name of the host. What the following command cannot do
is (single Choice of questions , 5 points)
A. System info
B.ipconfig/all
C.Hostname
D.set 15, 55. If you
do not have permission to access a certain page, which status code will the server return (single choice question, 5 points)
A.401
B .200
C.500
D.403
16.56. The word "HACKER" first appeared in (multiple choice, 5 points)
A. MIT AI Lab
B. AT&T Lab
C. BELL Lab
D None of the above
17. 57. What does not belong to the database encryption method is (single-choice question, 5 points)
A. Hardware/software encryption
B. Encryption in the library
C. Dedicated middleware encryption
D. Encryption outside the library
18, 58. IPSecVPN Security technology is not used (single-choice question, 5 points)
A. Port mapping technology
B. Tunnel technology
C. Encryption technology
D. Intrusion detection technology
19, 59.t"sq[Injection vulnerability:
http://i.xiaoming.com/user/says.php?
uid=1845%20skey=2014 This address is
The page used to search for the user’s previous statements will return some message
information. After a simple test, Xiaobin found that
http://i.xiaoming.com/user/says.php?
uid=1845%20skey=2014' %20or% 202-
1%20–%20 returns error information
http://i.xiaoming.com/user/says.php?
uid=1845%20skey=2014' %20)%20or%2
01-1%20–%20 If it returns blank information, then the
logically possible sq[ statement is:
(single-choice question, 5 points)
A. select * from user_says where
deleted=0 and uid= uid andskey like “% uid and skey like “%uid andskey like skey%”
B.select * from user_says where
deleted=0 and (uid= u i d   a n d s k e y   l i k e   ‘ % uid and skey like ‘% uid andskey like skey%’)
C.select * from user_says where
deleted=0 and (uid= u i d   a n d s k e y = , uid and skey=, u i d a n d s k e y =key,)
D.select * from user_says where
deleted=0 and uid= u i d   a n d s k e y = , uid and skey=, u i d a n d s k e y =, Key,
20,60. Which of the following tools can perform sq[injection attack? (multiple choice question, 5 points)
A.Msf
B.sqlmap
C.w3af
D.nmap

Guess you like

Origin blog.csdn.net/m0_48368237/article/details/114199087
Recommended