2021 Tennis Cup Youth Special Competition-Copsai WP

Exam time: 2021-09-25 09:00:00 - 2021-09-30 17:00:00

Description of the test paper: There are 30 questions in this test, 3 points per question for single-choice questions, 4 points per question for multiple-choice questions, and the full score is 100 points. Please answer the questions within the specified time of the test. If you do not answer, it will be submitted automatically and the score will not be recorded.

1. Multiple choice questions

1. Which of the following is wrong? ( )

 A. Registration and records are required to enter and exit the office and computer room

 B. There is no need for a special person to be on duty and accompany you in and out of the office and computer room, and you can go by yourself

 C. Equipped with electronic access control system in important areas

 D. The office area and computer room are equipped with a monitoring system and an anti-theft alarm system

Your answer: B Standard answer: B

2. Leaving a backdoor to the system is just to help him, not illegal. ( )

 A. correct

 B. wrong

Your answer: B Standard answer: B

3. In order to strengthen the company's publicity on the Internet, the company's customer information, important strategic goals, etc. can be placed on social networks.

 A. correct

 B. wrong

Your answer: B Standard answer: B

4. There are very few malicious software on mobile phones, so there is no need to install security software. ( )

 A. correct

 B. wrong

Your answer: B Standard answer: B

5. Which of the following is correct? ( )

 A. Be cautious when shopping online to prevent personal property from being harmed by phishing websites

 B. The courier order does not need to be destroyed intentionally, and it can be left in the public trash can at will

 C. Copy a few more copies of the ID card, and give others a few extra copies

 D. The more detailed the resume, the better, and mark your home address, relatives and other information

Your answer: A Standard answer: A

6. Which of the following is correct? ( )

 A. The child text message says that there is no money, no need to verify, just transfer the money to the past

 B. After receiving a fraudulent call, check it carefully and call the police

 C. Wechat friends say to borrow money, no need to verify, transfer directly

 D. Join the WeChat Red Envelope Solitaire Group, everyone can send and grab red envelopes together

Your answer: B Standard answer: B

7. Try to avoid storing too many work files in the mobile device to avoid the risk of file leakage or loss of the mobile phone.

 A. correct

 B. wrong

Your answer: A Standard answer: A

8. Which of the following is correct? ( )

 A. Use password management tools for password management

 B. The password is mainly remembered by the brain, without special management

 C. There are not many phishing websites at present, so there is no need to take precautions

 D. At present, the laws in our country are very strict, and hackers dare not attack us

Your answer: A Standard answer: A

9. Due to the threat of fake base stations, the identity of the other party cannot be completely identified through the mobile phone number.

 A. correct

 B. wrong

Your answer: A Standard answer: A

10. Which of the following is wrong? ( )

 A. It is not necessary for foreign personnel to fill in the visitor registration form, which is troublesome

 B. Outsiders must register and make an appointment according to the visitor registration form

 C. The registration form must clearly record the time, name, certificate name, etc.

 D. Outsiders must do a good job in identity verification and access control

Your answer: A Standard answer: A

11. When registering a network user, you can give priority to using your email address as an account registration.

 A. correct

 B. wrong

Your answer: A Standard answer: A

12. The most common method of electronic fraud is to take advantage of people's greed.

 A. correct

 B. wrong

Your answer: A Standard answer: A

13. The WIFI in hotels and hotels has a password, so there is absolutely no risk. ( )

 A. correct

 B. wrong

Your answer: B Standard answer: B

14. We should promptly fix the loopholes in computer operating systems and software because: ( )

 A. The operating system vulnerability patch is updated in time, and the software vulnerability patch does not need to be repaired in time

 B. Machines that were often infected with viruses before have no loopholes now

 C. Vulnerabilities are defects in computer systems or software systems through which viruses and malware can enter

 D. After manual update, the operating system will not be automatically updated when playing games, and will not occupy network bandwidth

Your answer: C Standard answer: C

15. Which of the following is correct? ( )

 A. Turn off sharing, do not automatically connect to the Wifi network

 B. Wifi security does not need to be tested, generally no problem

 C. Social account and online banking password generally do not need to be changed

 D. Multiple Wifis with the same or similar names are normal

Your answer: A Standard answer: A

16. Which of the following is correct? ( )

 A. After installing anti-virus software, you don’t have to worry about rogue software

 B. Rogue software is generally spoof in nature, so there is no need to worry

 C. A lot of rogue software is because of profit

 D. There is no difference between rogue software and ordinary software

Your answer: C Standard answer: C

17. Which of the following is correct? ( )

 A. At present, there are not many fake phishing WIFIs, so you don’t have to worry too much

 B. There is no security risk in using WIFI in public places, so feel free to use it

 C. It is absolutely safe to use the WIFI of the store in the mall

 D. False WiFi phishing is the main security risk of current free WiFi

Your answer: D Standard answer: D

18. Many mobile devices now provide the function of device positioning. After the mobile device is lost, the accurate location of the device can be obtained through this service.

 A. correct

 B. wrong

Your answer: B Standard answer: B

19. Which of the following is correct? ( )

 A. If you see strange verification codes and text messages, you don’t need to ignore them, and there is no risk

 B. The mobile phone signal suddenly drops from 4G to 2G, but the signal is not good

 C. Turn off the phone before going to bed or put the phone into airplane mode

 D. The flight mode of the mobile phone is still attacked, which is meaningless

Your answer: C Standard answer: C

20. A friend borrowed a Taobao account from me, and I should lend it to him as a matter of course. ( )

 A. correct

 B. wrong

Your answer: B Standard answer: B

2. Multiple Choice Questions

1. When using cloud services on mobile devices, what should be paid attention to to protect the security of accounts?

 A. Use complex and strong passwords

 B. Try to avoid using information such as birthdays and mobile phone numbers as passwords

 C. Turn on two-step verification or two-factor authentication

 D. Try not to log in to this account on other devices

Your answer: ABCD Standard answer: ABCD

2. When the wireless network is congested and the access speed is slow, what might happen? ( )

 A. ARP attack

 B. The phenomenon of rubbing the Internet

 C. Network congestion caused by weather

 D. Router failure

Your answer: AB Standard answer: AB

3. Which of the following are common means that can be used in phishing? ()

 A. Send inducement link in the group

 B. Send deceptive emails

 C. Camouflage the web interface

 D. Send inducement text messages

Your answer: ABCD Standard answer: ABCD

4. The loss of mobile devices will be more serious for personal losses, because ( ) is stored.

 A. Instant messaging tools, etc.

 B. Mobile payment software

 C. Personal information such as photos

 D. PC login user and password

Your answer: ABC Standard answer: ABC

5. Which of the following statements about the "Network Security Law" is incorrect is ________.

 A. The state stipulates that network operators other than critical information infrastructure must participate in the critical information infrastructure protection system

 B. Operators of critical information infrastructure can purchase network products and services by themselves without passing security review

 C. Network operators should strengthen the management of information released by their users, and if they find information that is prohibited by laws and administrative regulations from being released or transmitted, they should immediately report to their superiors

 D. The national network information department shall coordinate and coordinate relevant departments to strengthen the collection, analysis and notification of network security information, and uniformly release network security monitoring and early warning information in accordance with regulations

Your answer: ABC Standard answer: ABC

6. Which of the following suggestions on the security protection of social networking sites is correct? ()

 A. Do not fill in too detailed personal information

 B. Don't easily add social networking site friends you don't know in reality

 C. If you see any big event, forward it directly

 D. Do not easily believe the information reproduced by others

Your answer: ABD Standard answer: ABD

7. When using a mobile device for office work during a business trip, what should be done to access the resources of the office network?

 A. You should first confirm the security of the current network environment

 B. It should be connected to the network through a virtual local area network

 C. Can transmit more confidential data

 D. When you cannot access the office network, you can use the cloud disk to share data

Your answer: AB Standard answer: AB

8. When foreign personnel visit the enterprise, ( ) should be adopted in order to distinguish the personnel identification.

 A. Visitor registration is required

 B. Need to be accompanied by relevant staff

 C. Wear obvious visitor identification

 D. You can visit at will

Your answer: ABC Standard answer: ABC

9. Which of the following are staffing requirements in the safety management organization? ( )

 A. The security administrator can concurrently perform multiple management tasks

 B. There should be a certain number of system administrators, network administrators, security administrators, etc.

 C. There should be a full-time security administrator, not concurrently.

 D. Key affairs posts should be managed by multiple people.

Your answer: BCD Standard answer: BCD

10. Viruses are a major security threat in our daily network behavior. What should we do to prevent viruses?

 A. Install antivirus software

 B. Update the anti-virus software virus library in time and check and kill

 C. Repair system vulnerabilities in a timely manner

 D. to encrypt the data

Your answer: ABC Standard answer: ABC

Guess you like

Origin blog.csdn.net/Moxin1044/article/details/120702886