2017年度大数据时代的互联网信息安全92分.pdf
-
资源ID:55675309
资源大小:260.62KB
全文页数:14页
- 资源格式: PDF
下载积分:4.3金币
快捷下载
会员登录下载
微信登录下载
三方登录下载:
微信扫一扫登录
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
|
2017年度大数据时代的互联网信息安全92分.pdf
2017年度大数据时代的互联网信息安全92 分?1.下列关于计算机木马的说法错误的是:()(单选题2 分)得分:2 分oA.只要不访问互联网,就能避免受到木马侵害oB.Word 文档也会感染木马oC.杀毒软件对防止木马病毒泛滥具有重要作用oD.尽量访问知名网站能减少感染木马的概率?2.下面不属于网络钓鱼行为的是:()(单选题2 分)得分:2 分oA.网购信息泄露,财产损失oB.用户在假冒的网站上输入的信用卡号都进入了黑客的银行oC.黑客利用各种手段,可以将用户的访问引导到假冒的网站上oD.以银行升级为诱饵,欺骗客户点击金融之家进行系统升级?3.2014 年 2 月,我国成立了(),习近平总书记担任领导小组组长。(单选题2分)得分:2 分oA.中央网络安全和信息化领导小组oB.中央网络安全和信息技术领导小组oC.中央网络信息和安全领导小组oD.中央网络技术和信息化领导小组?4.棱镜计划(PRISM)是一项由()自 2007 年起开始实施的绝密电子监听计划(单选题 2 分)得分:2 分oA.美国国家安全局oB.美国天平洋舰队oC.美国联邦法院oD.美国驻华大使馆?5.网络安全领域,把已经被发现,但相关软件厂商还没有进行修复的漏洞叫什么漏洞?()(单选题2 分)得分:2 分oA.0day 漏洞oB.无痕漏洞oC.DDAY漏洞oD.黑客漏洞?6.网络安全与信息化领导小组成立的时间是:()(单选题2 分)得分:2 分oA.2015 oB.2013 oC.2014 oD.2012?7.下列选项中不是APT攻击的特点:()(单选题2 分)得分:2 分oA.手段多样oB.攻击少见oC.目标明确oD.持续性强?8.大数据的起源是:()(单选题2 分)得分:2 分文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9oA.金融oB.电信oC.公共管理oD.互联网?9.与大数据密切相关的技术是:()(单选题 2 分)得分:2 分oA.云计算oB.博弈论oC.wifi oD.蓝牙?10.王先生近期收到了一封电子邮件,发件人显示是某同事,但该邮件十分可疑,没有任何与工作相关内容,邮件中带有一个陌生的网站链接,要求他访问并使用真实姓名注册,这可能属于哪种攻击手段?()(单选题2 分)得分:2 分oA.钓鱼攻击oB.水坑攻击oC.DDOS 攻击oD.缓冲区溢出攻击?11.以下哪个选项是目前利用大数据分析技术无法进行有效支持的?()(单选题2分)得分:2 分oA.新型病毒的分析判断oB.个人消费习惯分析及预测oC.天气情况预测oD.精确预测股票价格文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9?12.许多黑客攻击都是利用软件实现中的缓冲区溢出的漏洞,对于这一威胁,最可靠的解决方案是什么?()(单选题2 分)得分:2 分oA.给系统安装最新的补丁oB.安装防病毒软件oC.安装入侵检测系统oD.安装防火墙?13.下列选项中,最容易遭受来自境外的网络攻击的是:()(单选题2 分)得分:2 分oA.掌握科研命脉的机构oB.电子商务网站oC.新闻门户网站oD.大型专业论坛?14.在连接互联网的计算机上()处理、存储涉及国家秘密和企业秘密信息。(单选题 2 分)得分:2 分oA.只要网络环境是安全的,就可以oB.严禁oC.不确定oD.可以?15.以下对网络空间的看法,正确的是:()(单选题2 分)得分:2分oA.网络空间是一个无国界的空间,不受一国法律约束oB.网络空间与现实空间分离,现实中的法律不适用于网络空间oC.网络空间虽然与现实空间不同,但同样需要法律文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9oD.网络空间是虚拟空间,不需要法律?16.我们应当及时修复计算机操作系统和软件的漏洞,是因为:()(单选题2 分)得分:2 分oA.手动更新后,玩游戏时操作系统就不会自动更新,不会占用网络带宽了oB.以前经常感染病毒的机器,现在就不存在什么漏洞了oC.漏洞就是计算机系统或者软件系统的缺陷,病毒和恶意软件可以通过这个缺陷趁虚而入oD.操作系漏洞补丁及时升级,软件漏洞补丁就没有必要及时修复?17.用户收到了一封可疑的电子邮件,要求用户提供银行账户及密码,这是属于何种攻击手段?()(单选题2 分)得分:2 分oA.缓存溢出攻击oB.钓鱼攻击oC.暗门攻击oD.DDOS 攻击?18.下列错误的是:()(单选题2 分)得分:2 分oA.由于网络是虚拟世界,所以在网上不需要保护个人的隐私oB.虽然网络世界不同于现实世界,但也需要保护个人隐私oC.可以借助法律来保护网络隐私权oD.网络时代,隐私权的保护受到较大冲击?19.大数据时代,数据使用的关键是:()(单选题2 分)得分:2 分oA.数据再利用文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9oB.数据存储oC.数据收集oD.数据分析?20.2014 年 2 月 27 日,中共中央总书记、国家主席、中央军委主席、中央网络安全和信息化领导小组组长习近平2 月 27 日下午主持召开中央网络安全和信息化领导小组第一次会议并发表重要讲话。他强调,()和()是事关国家安全和国家发展、事关广大人民群众工作生活的重大战略问题。(单选题2 分)得分:0 分oA.安全、发展oB.网络安全、信息安全oC.信息安全、信息化oD.网络安全、信息化?21.张同学发现安全软件提醒自己的电脑有系统漏洞,如果你是张同学,最恰当的做法是?()(单选题2 分)得分:2 分oA.立即更新补丁,修复漏洞oB.暂时搁置,一天之后再提醒修复漏洞oC.不与理睬,继续使用电脑oD.重启电脑?22.逻辑域构建了协议、()、数据等组成的信息活动域。(单选题2 分)得分:2 分oA.软件oB.硬件oC.网络oD.附件文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9?23.一个网络信息系统最重要的资源是:()(单选题2 分)得分:2分oA.数据库oB.计算机硬件oC.网络设备oD.数据库管理系统?24.下面关于我们使用的网络是否安全的正确表述是:()(单选题2 分)得分:2 分oA.没有绝对安全的网络,使用者要时刻提高警惕,谨慎操作oB.安装了防火墙和杀毒软件,网络是安全的oC.设置了复杂的密码,网络是安全的oD.安装了防火墙,网络是安全的?25.世界上首例通过网络攻击瘫痪物理核设施的事件是?()(单选题 2 分)得分:2 分oA.以色列核电站冲击波事件oB.巴基斯坦核电站震荡波事件oC.伊朗核电站震荡波事件oD.伊朗核电站震网(stuxnet)事件?26.大数据是需要新处理模式才能具有更强的()的海量、高增长率和多样化的信息资产。(多选题3 分)得分:0 分oA.决策力oB.流程优化能力oC.判断力文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9oD.洞察发现力?27.拒绝服务攻击是黑客常用的攻击手段之一,以下属于拒绝服务攻击防范措施的是:()(多选题3 分)得分:3 分oA.安装防火墙,禁止访问不该访问的服务端口,过滤不正常的畸形数据包oB.安装安全评估系统,先于入侵者进行模拟攻击,以便及早发现问题并解决oC.安装先进杀毒软件,抵御攻击行为oD.安装入侵检测系统,检测拒绝服务攻击行为?28.大数据的特征是:()(多选题3 分)得分:0 分oA.速度快oB.类型多oC.价值密度低oD.规模大?29.最常用的网络安全模型PDRR 是指:()(多选题3 分)得分:3 分oA.反应oB.保护oC.检测oD.恢复?30.请分析,以下哪些是高级持续性威胁(APT)的特点?()(多选题 3 分)得分:3 分oA.不易被发现文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8