The end of the semester of network security in Shandong University (2022.6.13 recall version taught by Wang Fengyu)

The end of the semester of network security in Shandong University (2022.6.13 recall version taught by Wang Fengyu)

1. The principles of misuse detection and anomaly detection, what are their advantages and disadvantages

2. The attack principle of SQL injection and CSRF, and write a defense measure for each of them

3. What is the demilitarized zone (DMZ) in firewall deployment and what is its function

4. Design an information transmission mechanism so that it can guarantee the authenticity of the information sender and the integrity of the information, draw a picture to illustrate

5. The working principle of IPSec transmission mode and tunnel mode, and what are their application scenarios

6. How do IP Flux and Domain Flux in the botnet escape detection? Please draw a picture to explain

7. The SYN cookie algorithm is a typical measure against SYN Flood, please explain its algorithm process

8. Give an example to illustrate the attack process of buffer overflow

9. What is character execution? His role? and its pros and cons.

10. The structure of computer viruses in a narrow sense and the functions of each module.

ps: The total score of the paper is 100 points, and one question is 10 points. According to this paper, there is one test for each chapter (the first chapter is not tested)

Guess you like

Origin blog.csdn.net/qq_50861917/article/details/125261428