2017年度大数据时代的互联网信息安全92分.pdf
《2017年度大数据时代的互联网信息安全92分.pdf》由会员分享,可在线阅读,更多相关《2017年度大数据时代的互联网信息安全92分.pdf(14页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、2017年度大数据时代的互联网信息安全92 分?1.下列关于计算机木马的说法错误的是:()(单选题2 分)得分:2 分oA.只要不访问互联网,就能避免受到木马侵害oB.Word 文档也会感染木马oC.杀毒软件对防止木马病毒泛滥具有重要作用oD.尽量访问知名网站能减少感染木马的概率?2.下面不属于网络钓鱼行为的是:()(单选题2 分)得分:2 分oA.网购信息泄露,财产损失oB.用户在假冒的网站上输入的信用卡号都进入了黑客的银行oC.黑客利用各种手段,可以将用户的访问引导到假冒的网站上oD.以银行升级为诱饵,欺骗客户点击金融之家进行系统升级?3.2014 年 2 月,我国成立了(),习近平总书记
2、担任领导小组组长。(单选题2分)得分:2 分oA.中央网络安全和信息化领导小组oB.中央网络安全和信息技术领导小组oC.中央网络信息和安全领导小组oD.中央网络技术和信息化领导小组?4.棱镜计划(PRISM)是一项由()自 2007 年起开始实施的绝密电子监听计划(单选题 2 分)得分:2 分oA.美国国家安全局oB.美国天平洋舰队oC.美国联邦法院oD.美国驻华大使馆?5.网络安全领域,把已经被发现,但相关软件厂商还没有进行修复的漏洞叫什么漏洞?()(单选题2 分)得分:2 分oA.0day 漏洞oB.无痕漏洞oC.DDAY漏洞oD.黑客漏洞?6.网络安全与信息化领导小组成立的时间是:()(
3、单选题2 分)得分:2 分oA.2015 oB.2013 oC.2014 oD.2012?7.下列选项中不是APT攻击的特点:()(单选题2 分)得分:2 分oA.手段多样oB.攻击少见oC.目标明确oD.持续性强?8.大数据的起源是:()(单选题2 分)得分:2 分文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:C
4、Z8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6
5、D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:C
6、Z8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6
7、D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:C
8、Z8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6
9、D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9oA.金融oB.电信oC.公共管理oD.互联网?9.与大数据密切相关的技术是:()(单选题
10、2 分)得分:2 分oA.云计算oB.博弈论oC.wifi oD.蓝牙?10.王先生近期收到了一封电子邮件,发件人显示是某同事,但该邮件十分可疑,没有任何与工作相关内容,邮件中带有一个陌生的网站链接,要求他访问并使用真实姓名注册,这可能属于哪种攻击手段?()(单选题2 分)得分:2 分oA.钓鱼攻击oB.水坑攻击oC.DDOS 攻击oD.缓冲区溢出攻击?11.以下哪个选项是目前利用大数据分析技术无法进行有效支持的?()(单选题2分)得分:2 分oA.新型病毒的分析判断oB.个人消费习惯分析及预测oC.天气情况预测oD.精确预测股票价格文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 Z
11、M3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6
12、T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 Z
13、M3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6
14、T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 Z
15、M3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6
16、T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 Z
17、M3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9?12.许多黑客攻击都是利用软件实现中的缓冲区溢出的漏洞,对于这一威胁,最可靠的解决方案是什么?()(单选题2 分)得分:2 分oA.给系统安装最新的补丁oB.安装防病毒软件oC.安装入侵检测系统oD.安装防火墙?13.下列选项中,最容易遭受来自境外的网络攻击的是:()(单选题2 分)得分:2 分oA.掌握科研命脉的机构oB.电子商务网站oC.新闻门户网站oD.大型专业论坛?14.在连接互联网的计算机上()处理、存储
18、涉及国家秘密和企业秘密信息。(单选题 2 分)得分:2 分oA.只要网络环境是安全的,就可以oB.严禁oC.不确定oD.可以?15.以下对网络空间的看法,正确的是:()(单选题2 分)得分:2分oA.网络空间是一个无国界的空间,不受一国法律约束oB.网络空间与现实空间分离,现实中的法律不适用于网络空间oC.网络空间虽然与现实空间不同,但同样需要法律文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:
19、CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J
20、6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:
21、CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J
22、6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:
23、CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J
24、6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9文档编码:CZ8Y6T9C9E2 HB7D1F2J6D1 ZM3H3Y9U8Z9oD.网络
25、空间是虚拟空间,不需要法律?16.我们应当及时修复计算机操作系统和软件的漏洞,是因为:()(单选题2 分)得分:2 分oA.手动更新后,玩游戏时操作系统就不会自动更新,不会占用网络带宽了oB.以前经常感染病毒的机器,现在就不存在什么漏洞了oC.漏洞就是计算机系统或者软件系统的缺陷,病毒和恶意软件可以通过这个缺陷趁虚而入oD.操作系漏洞补丁及时升级,软件漏洞补丁就没有必要及时修复?17.用户收到了一封可疑的电子邮件,要求用户提供银行账户及密码,这是属于何种攻击手段?()(单选题2 分)得分:2 分oA.缓存溢出攻击oB.钓鱼攻击oC.暗门攻击oD.DDOS 攻击?18.下列错误的是:()(单选题
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 2017 年度 数据 时代 互联网 信息 安全 92
限制150内