2015网络信息技术应用与网络安全 答案(2015 network information technology application and network security answer).docVIP

  • 1
  • 0
  • 约5.69千字
  • 约 6页
  • 2017-08-31 发布于河南
  • 举报

2015网络信息技术应用与网络安全 答案(2015 network information technology application and network security answer).doc

2015网络信息技术应用与网络安全 答案(2015 network information technology application and network security answer)

2015网络信息技术应用与网络安全 答案(2015 network information technology application and network security answer) Your score is now 49! Your grades are below the required pass. Please do it again! Error: Radio question 4. is divided according to geographical coverage. The computer network can be divided into the following three categories. The correct answer: A. Wan, LAN, Metro Radio question 5. () is also called denial of service attack. The Trojan requires a large number of computers attacking the target host at the same time, so the attack is to obtain multiple clients and then insert the attack Trojan, and the client is also called the broiler. The correct answer: C. DoS attack Trojan horse 8. mainstream information security products and services include: () through the characteristics of computer viruses found and timely removal of the virus, to prevent damage to computers and networks The correct answer: A. antivirus (Anti-Virus) 1. multiple-choice questions for hazard prevention of Trojan horse, the work of several general users should do the following: The correct answer: A. firmly establish the idea of prevention, B. protect the safety of accounts, C. do a variety of emergency preparedness work 2. multiple-choice questions into the Baidu home page, can enter through one click two pages (a). The correct answer: A., B., C., D. 5. multiple-choice questions online shopping, the correct approach is (). Correct answer: buy A. choose well-known shopping site C. Alipay D. secured transactions pick with the cheapest model Determine the two main approaches 3. QQ password stealing Trojan hacking and hacking. The correct answer: wrong Judgment 7., violation of discipline is not a threat to the form of computer network security. The correct answer: wrong Judge question 10. about network security, different people stand in different angles, have different understanding of computer network security. The security of network users is that they can not appear unauthorized access and damage

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档