版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
計算機(jī)網(wǎng)絡(luò)安全員培訓(xùn)考試題庫(答案)原版(Computernetwork
securitystafftrainingexaminationquestionsdatabase
(answer)original)Computernetworksecuritystafftrainingexaminationquestionsdatabase(answer)originalTrainingcourseexercises(1)Chapter1Introductionsecurityregulations,securitytechnologyandsecuritymanagementarethreemajorcomponentsofcomputerinformationsystemsecurityprotection.Answer:Ydifficulty:Athebasiccomponentsofacomputerinformationsystemare:computerentities,information,and().networkmediapeopleciphertextAnswer:Cdifficulty:Csecurity,informationsecurity,operationsecurityandpersonnelsecurity.Answer:Ydifficulty:Bfromthepointofviewofsystemengineering,computerinformationnetworkisrequired.availability,integrity,confidentialityauthenticity(nonrepudiation)reliabilityandcontrollabilitystabilityAnswer:ABCdifficulty:B5.thesecuritythreatsofcomputerinformationsystemcomefromtwoaspectsinsideandoutside.Answer:Ydifficulty:A,thevulnerabilityofcomputerinformationnetworkleadstothevulnerabilityandsecurityofinformationsociety.Answer:Ydifficulty:Ameasuresfortheimplementationofcomputerinformationsystemsecurityprotectioninclude:().A.safetyregulationssafetymanagementsecuritytechnologysafetytrainingAnswer:ABCdifficulty:B8.,thenationalpublicinformationnetworksecuritysupervisionworkisanimportantpartofpublicsecuritywork.Answer:Ydifficulty:A9.,inordertoprotectinformationsecurity,inadditiontotheinformationsecurityprotection,weshouldalsopayattentiontoimprovethesystemintrusiondetectionAbility,systemeventresponsecapability,andrapidrecoverycapabilityifthesystemiscompromisedbyintrusions.Answer:Ydifficulty:C10.OSILayerSecuritytechniquestoconsidersecuritymodels0.physicallayerdatalinklayernetworklayer,transportlayer,sessionlayerpresentationlayer,applicationlayerAnswer:ABCDdifficulty:C11.datalinklayercanbeusedAndencryption,becausedifferent1inklayerprotocolshavedifferentframeformats,sowhenencrypting,differentlinklayerprotocolsmustbedistinguished.routingintrusiondetectiondigitalsignatureaccesscontrolAnswer:Bdifficulty:Cthesecuritymechanismsadoptedinthenetworkareasfollows:().zoneprotectionencryptionandconcealmentmechanisms;authenticationandidentityauthenticationmechanisms;auditing;integrityprotectionpowercontrolandaccesscontrol;businessfill;routingcontrolnotarizationmechanism;redundancyandbackupAnswer:BCDdifficulty:D13.publickeyinfrastructure(PK1)consistsofthefollowingcomponents:().CertificationCenter;RegistrationCenterqualityinspectioncenterconsultingservicecertificateholder;user;certificateLibraryAnswer:ADdifficulty:C.,whenthepublicsecurityorgansexerciseadministrativesupervisionofcomputerinformationsystemsinothercountries,thelegalstatusofbothsidesisequal.Answer:Ndifficulty:B.,thepeople'spoliceexercisethecomputerinformationsystemsafetysupervisionrightisrepresentativeofthecountry,soitisthemainbodyoftheadministration.mandatorytechnicalstandards,isrecognizedbythestatelawsandregulations,therelativevoluntarycomplianceandimplementationoftechnicalstandards.Answer:Ndifficulty:B,thekeypointofourcomputerinformationsystemsecurityismaintenanceAndotherimportantareasofcomputerinformationsystemsecurity.nationalaffairseconomicconstructionandnationaldefenseconstructionadvancedscienceandtechnologyEducationCultureAnswer.ABCdifficulty:Baslongasthecomputerinformationsysteminourcountryanditssecurityprotectionareapplicable,theregulationsonthesafetyprotectionofcomputerinformationsystemsshallapply.Answer:Ndifficulty:AThefourthchapter,computerinformationsystemsecurityprotectionsystemNineteenThesecuritylevelistheconfirmationofthecomputerinformationsystembythenationalinformationsecuritysupervisionandadministrationdepartment.scaleimportancesecuritycapabilitynetworkstructureAnswer:Cdifficulty:BThe20.securitylevelisareflectionoftheimportanceandsensitivityofthecomputerinformationsystem.applicationareausessystemhardwaretakesafetymeasuresprocessinginformation,thepublicsecurityorgansintheInternetcafebeforetheofficialbusiness,donotneedtoconductsecurityauditsofInternetcafes.Answer:Ndifficulty:AInternetusersmustusevalidIDtousetheinternet.Answer:Ydifficulty:AInternetcafescanbeleasedtootheroperators.Answer:Ndifficulty:AInternetcafesownersandsecuritymanagementpersonneltocarryoutsafetyknowledgetraining.Answer:Ydifficulty:A26.computerinformationsystemusingunits()securitymanagementsystem.doesnotalwayshavetobebuiltcanbeestablishedshouldbeestablishedvoluntaryestablishmentresponsibleforcomputerinformationsystemsecurityspecialproductsaleslicenseapprovalandissuedthe"computerinformationsystemsecurityspecialproductsalespermit"is().NationalBureauofTechnicalSupervisionMinistryofinformationindustryPublicSecurityNetworkSupervisionBureauofMinistryofpublicsecurityDepartmentofnationalsecurityAnswer:Cdifficulty:A28.thePublicInformationNetworkSecuritySupervisionBureauoftheMinistryofpublicsecurityisresponsibleforthesaleslicenseofcomputerinformationsystemsecurityspecialproducts)work.managementapprovalandcertificationC.approvalD.ProductionsAnswer:Bdifficulty:Aacomputervirusisasetofcomputerinstructionsorprogramcodethatisprogrammedorinsertedintoacomputerprogramtodestroycomputerfunctionordestroydataandaffecttheuseofacomputer.Answer:Ndifficulty:Bacomputervirusisasetofcomputerinstructionsorprogramcodethatcan().destroyscomputerfunctiondestroyscomputerdataselfreplicationharmsthehealthofcomputeroperatorsAnswer:ABCdifficulty:C,violationsofstatelawsandregulations,endangeringthesafetyofcomputerinformationsystems,knownascomputercases.In32.,theconstructionofcomputerinformationsystemintheoperationmanagement,theimportantsafetytechnologyandsafetystandardsimplementation,systemconstructionandimplementationmeasures,preventmajorsecurity,foundillegal,accidents,andothersafetymanagementinamajorsecurityrelatedbehavior,safeevent.Answer:Ydifficulty:A33.computercasesdividedintocriminalcasesandadministrativecases,whichviolatethecriminallawofthecomputercaseiscomputercriminalcases,inviolationofadministrativeregulationsofcomputersecuritycomputeradministrativecases.Answer:Ydifficulty:AThefifthchapter,computerinformationnetworksecurityprotectionanddetectiontechnologyThe34.TCP/IPprotocolis(),andthedataisusuallyonthenetwork,anditiseasyto.publicreleaseeavesdroppinganddeceptionencryptedtransportplaincodetransferAnswer:ADBdifficulty:Cnetworkattacksgenerallyhavethreestages:().getsinformationandspreadswidelyaccesstotheinitialaccess,andthentrytogettheprivilegeofthetargetleavesthebackdoor,attacksothersystemtargets,andevenattackstheentirenetworkcollectsinformationandlooksforgoalsAnswer:DBCdifficulty:Cthecontentofintrusiondetectionmainlyincludes:().exclusiveresources,malicioususeattemptstobreakinorsuccessfullybreakinandimpersonateotheruserssecurityauditbreachessecuritypolicies,legitimateusers'leaksAnswer:BDAdifficulty:Cusingahumanintrusiondetectionsystem(IDS)todetecttime,Thefirstproblemisdecidingwheretoinstall,detect,andanalyzeintrusiondetectionsensors(Sensor)ortestengines(Engine).Answer:Ydifficulty:C,forintrusiondetectionsystems(IDS),itwouldbepointlesstodetectonlyhackerintrusionsifnot.responsemeasuresresponsemeasuresormeasurespreventionpolicyresponsedeviceAnswer:Bdifficulty:Ccomputercrimestatisticsshowthatcomputersecurityproblemsstemmainlyfrom().hackerattackscomputervirusattackssysteminternalAnswer:Cdifficulty:CThesixthchapter,theentitysecurityprotectiontechnologyandthecomputerroomtestcomputerroomisthekeyplacetoinstallthemainbodyofcomputerinformationsystem,anditisthefocalpointofwork,soweshouldstrengthenthesafetymanagementofcomputerroom.entitysecurityprotectionpersonnelmanagementmediasecurityprotectiondevicesecurityprotectionAnswer:Adifficulty:Bthecomputerroomshallconformtothenationalstandardsandtherelevantstateregulations.Constructioninthevicinityofthecomputerroomshallnotendangerthesafetyofthecomputerinformationsystem.Answer:Ydifficulty:Ainchargeofthesecurityofcomputerinformationsystemofpublicsecurityorgansandurbanconstructionandplanningdepartmentsshouldbecoordinatedwiththeconstructionunit,inthepremiseofnotharmtheinterestsofusers,formulatemeasures,reasonableconstruction,goodsafetyprotectionofcomputerinformationsystem.Answer:Ndifficulty:Aentitysecuritytechnologiesinclude:().environmentalsecuritydevicesecuritypersonnelsafetymediasecurityAnswer:ABDdifficulty:B44.,regionalsecurityshouldbeconsideredfirst(c)usedtoidentifyandaccesstheidentityoftheuserandverifyitslegality,mainlythroughspecialidentifiers,passwords,fingerprintsandsoon.visitors,holdingsphysicalaccesscontrolvisitorshavecharacteristicsvisitor,sinformationAnswer:Bdifficulty:Cantistaticmeasuresareuseofanti-staticfloor;staffarerequiredtowearanti-staticclothingandshoesintotheroomindoorrelativetemperaturerangeisasfollows:45%,65%;computerandfloorareeffectivelygroundedinstallshieldingmaterialofficeroom,officeequipmentorauxiliaryequipmentmaterialsshouldbeproducedasfaraspossibleusinglessstaticmaterialAnswer:ABDdifficulty:Acomputersystemgroundingincludes:DCground;ACworkplace;safetyprotectionground;powersupplyzerolineandlightningprotectionsite.Answer:Ndifficulty:B,theuseofshieldingroom,first,inordertoisolatetheexternalandinternalequipment,mutualelectricfield,magneticfield,electromagneticinterference,andtwoistopreventinterferencefromtheelectromagneticradiationgeneratedbythesourcetotheexternalspace.classamedia:thecontentofthemediaisthemostimportanttothe()function,cannotbereplaced,andcannotberestoredimmediatelyafterthedamage.securityoperationsystemdeviceAnswer:CDdifficulty:Btransportation,carryingormailingofcomputerinformationmediashallbesubmittedtothestateastrue(or).customsbusinesstaxfrontierdefenseAnswer:Adifficulty:Athecomputersiteistheplacewherethecomputerinformationnetworkisinstalledandoperated.Itisalsotheplacewheretheinterfaceoftheman-machinesystemisformed,andisthephysicalplacefor"human-computerinteraction”.It
isanimportantpartofourimplementation.Thepracticalinspectionofthecomputersiteisanimportantmeanstoensurethesecurityoftheinformationnetwork.A.computerinformationnetworksecurityoperationB.computerinformationnetworksecuritysupervisionB.computerinformationnetworksecuritysupervisionC.D.computerinformationnetworksecurityprotectioncomputerinformationnetworksecuritytestC.D.Answer:Bdifficulty:Bcomputersitesafetytesting,including:().temperature,humidity,dustillumination,noise,electromagneticinterference,environmentalfieldintensitygroundresistance,voltage,frequencywaveformdistortionrateanalysismethodforcorrosivegasesAnswer:ABCDdifficulty:AtheequipmentoftheinformationsystemcanpassbyatworkAndsoonradiation,produceelectromagneticleakage.Theelectromagneticsignalisreceivedasdown,afterextraction,itcanrestoretheoriginalinformation,resultingininformationsecurity.groundwiresignallineparasiticelectromagneticsignalsorharmonicsantennaAnswer.*ABCdifficulty:CTEMPESTtechnologyhasthreemainprotectionmeasures:firstistosuppress;secondistoshield;thirdistosendinterferencesignals.Atthesametime,thesystemworkswithpseudonoisetoconcealtheworkingfrequencyandinformationcharacteristicsofthesystem,sothattheinformationcontentcannotbedetectedbytheoutsideworld.Answer:Ydifficulty:Cencryptiontransmissionisaveryeffectiveandfrequentlyusedmethod,anditcansolvetheelectromagneticinformationleakageproblemoftheinputandoutputterminals.Answer:Ndifficulty:BThe55.EMCstandardisdesignedtoensure(normal)work.A.networkmediainformationsystemsandequipmentAnswer:Ddifficulty:C56)referstoallmagneticsignalsthatarenotassociatedwiththeusefulsignal,undesired,oradverselyaffectedbyelectricalandelectronicequipment.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Cdifficulty:C57(E)referstotheelectromagneticnatureofanelectronicsystemordevicethatdoesnotaffecteachotherinanelectromagneticenvironmentthatisnormallyoperating.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Adifficulty:BEMCtestsandcontrolstheelectromagneticemissionofinformationsignalsthatuserscareabout.TheTEMPESTonlytestsandconstrainsallelectromagneticemissionsofthesystemandequipment.Answer:Ndifficulty:Credsignalsarethoseoncestolen,thesignalwillcausetheuserinformationconfidential.Othersignalsarecalled“blacksignals.Answer:Ydifficulty:C,redzone:redsignaltransmissionchannelorunitcircuitcalledredzone,andviceversaisblackarea.Answer:Ydifficulty:Cradiationinterference:interferenceexistsintheformofvoltageandcurrent,andthroughthecircuit,theinterferenceiscoupledtothedevice.ConductiontrunkInterference:thepresenceofradiation,electricfield,andmagneticfieldcoupledtotheequipmentorsystembyelectromagneticfieldemission.Answer:Ndifficulty:C,thebasicprotectionofthreemethods:first,tosuppresselectromagneticemissions,takevariousmeasurestoreducethe“redzone"circuitelectromagneticemission.Thetwoisshieldingisolation,arounditusingavarietyofshieldingmaterialstomakeitattenuatedredsignalsignal,electromagneticlaunchfieldissmallenoughtomakeitdifficulttoreceive,andevencannotreceive.Thethreeisrelatedinterference(containment),takevariousmeasurestomakeinformationrelatedtoelectromagneticemissionleakageisreceivedandcannotidentify.Answer:Ydifficulty:Ccommonlyusedmethodsofelectromagneticinformationleakageareasfollows:().informationencryptioncorrelationinterferencemethodsuppressionmethod”screen"law,thatis,theairspacelawAnswer:DCBAdifficulty:Cthemostimportantsourcesofelectromagneticinterferenceare:().powercycleinterferencelightningelectromagneticpulseLEMPgridoperatingovervoltageSEMPelectrostaticdischargeESDAnswer:BCDdifficulty:Cmentionedlightningprotection,itiseasytothinkofthelightningrod.Infact,weusuallyseethelightningrodisusedtoprotectthehousefromlightningstrike,thatis,againstdirectlightning.Thecomputerinformationsystemoftheelectronicequipmentoflightningproducedbyinductionlightningprotection,sothemethodiscompletelydifferent.Answer:Ydifficulty:B,themainwaysofthunderintrusionintocomputerinformationsystemare:().InformationtransmissionchannellineintrusionpowersupplylineintrusionbuildinggroundpotentialcounterattackAnswer:BADdifficulty:Ctopreventthecomputerinformationsystembylightning,cannotexpect(),whichnotonlyprotectthecomputersystem,butincreasedthecomputersystemoflightning.isbuiltinopenspaceslightningrodbuildingheightreducescomputersystemmountingfloorsAnswer:Bdifficulty:Clightningprotectionmeasuresinallisconnectedwiththecomputerontheoutside(includingpowerlineandcommunicationlines)withspeciallightningprotectionequipment-lightningprotector,andstandardwire,topreventthegenerationofhighpotentialingroundlightningcounterattack.Answer:Ydifficulty:Blightningprotectiondeviceisdividedinto:().A.operationlightningprotectiondeviceLightningprotectiondeviceforB.communicationinterfaceC.buildinglightningprotectiondeviceLightningprotectiondeviceforD.powersupplyAnswer:BDdifficulty:Ccomputerinformationsystemprotection,simplysummarizedare:voltagesharing,shunt,shieldingandgoodgrounding.Therefore,lightningprotectiondevicesmustbereasonable).shieldconfigurationgroundconfigurationshuntconfigurationpressuresharingconfigurationAnswer:Bdifficulty:Ccomputerinformationsystemsecurityprotectionlightningovervoltageandovercurrentmustadoptadvancedtechnology,reasonableeconomy,safetyandpracticality,theabovenationalcertificationministerialspecializinginlightningprotectionequipmenttestinglaboratorytesting,andthe()withexcellentproducttypestandardGA173-1998,zcomputerinformationsystem*intheconfirmationofthelightningprotector.NationalSecurityAgencynationalqualityinspectiondepartmentadministrationofindustryandCommercepublicinformationnetworksecuritysupervisiondepartmentAnswer:Ddifficulty:Binstallationofthecomputerinformationsystemofqualified1ightningprotector,mustalsobein()beforethunderstormseasonoflightningprotector:protectiveearthingdeviceforanannualinspection,foundunqualified,shouldbetimelyrepairorreplacement.thirdyearssecondyearsannuallyD.thenAnswer:Cdifficulty:BTheseventhchapter,riskanalysistechnologyandaudittracking73.()istoconsiderthepossibleharmtotheinformationsystemcausedbyman-madeornaturalthreatfactorsandthepossiblermationsecurityanalysisoperationsafetyanalysisriskanalysissecuritymanagementanalysisAnswer:Cdifficulty:Btheriskmanagementprocesshasthreebasicelements:().A.'splanfortheaccidentChoiceofB.safetymeasuresconfirmationandidentificationeconomicriskestimation75.,thebenefitsofriskanalysisare:().helpstostrengthenscientificdecision-makingandpreventionmeasuresforsafetymanagementhelpstomakereasonableuseofthefundshelpsimprovesafetyisconducivetosafetyengineeringplanningAnswer:CABDdifficulty:Briskanalysisstepbystepis:().assetinventory;understandingthesourcesofthreatsandtheirimpactonassetvulnerability;estimatingthelikelihoodofathreatreviewsecuritypolicycalculatestheannualexpectedloss;investigatesfeasiblesafetymeasuresandtheircostoverheadcalculatesannualrevenuefromsecuritymeasures;developssecurityplansAnswer:ACDdifficulty:C,theparticipationofthesecurityplancannotbemadebyallpersonneloftheunit,buttheimplementationofthesafetyplanrequiresfullparticipation.Thisneedstocarryonthesafetyeducationtotheunit(),enhancestheirsecurityconsciousness.securitypersonnelleadingcadreallstaffmanagersAnswer:Cdifficulty:Aaudittrackingisthepreestimationofthethreatofsecurityfactorsandtheeffectivenessofpreventivemeasurestaken,andriskanalysisasameansoftrackingaftertheeventtomaintainthesafetyofthesystem.Answer:Ndifficulty:ASeventy-nineInformationsecurityauditsystemhasthefollowingfiveimportantsecurityobjectives:(1)theauditreviewofindividualobjectaccess,personalaccesstodetailedhistory,supportavarietyofprotectionmechanismofeffectiveness;(2)foundillegaluseandattempttobypassprotectionmechanism,trytorepeatthefailure;(3)finduseroperationbeyondtheirownauthority;(4)toattempttobypasssystemofprotectionmechanismofoffendersconstitutetechnicalbarriersandlegaldeterrence;(5)recordsandfoundwaystoprovideattempttobypassprotectionmechanismforusers.Answer:Ydifficulty:A80.audittrackingtechnologycansetupa"worklog"fortheoperationoftheinformationsystem.Iftheaudittrackingfunctionisstarted,theworklogcanbechanged.Itismaintainedbythesystemandmanagedbyalllevelsofsecuritymanagementatthediscretionofthepeople.Answer:Ndifficulty:BTherelationshipbetweenthe81.auditandcomputercrimeare:theestablishmentofaudittracking,topreventcomputercrime;theaudittrail,exposepossiblecomputercrime;accordingtotheaudittracking,investigationofcomputercrime;onthebasisofaudittracking,computercrimes.Answer:Ydifficulty:ATheeighthchapterisaboutthelegalresponsibilityofcomputerinformationsystemsecurityprotection.82,thelegalliabilitythattheadministrativecounterpartviolatesthecomputerinformationsystemsecurityprotectionlawmayinclude:().A.civilliabilityadministrativeresponsibilitystatecompensationliabilityAnswer:ABCdifficulty:Acomputercrimeisthebehaviorofthecomputerasatoolortocomputerassetsastheobjectofcrime,accordingtoChina,scriminallawshouldbepunished,withsocialharmbehavior.Answer:Ydifficulty:Astatecompensationcanbedividedinto().militarycompensationcriminalcompensationadministrativecompensationjudicialcompensationAnswer:BCdifficulty:Btheorganofdutyforadministrativecompensationis().administrativeorgansfortheimplementationofviolationsimplementstheinfringingpersonnelofindividualpersonnelimplementstheadministrativeorgansinwhichtheinfringingpersonnelbelongpeople,sgovernmentsatorabovethecountylevelAnswer:ACdifficulty:B,administrativecompensationreferstotheillegalexerciseoffunctionsandpowersbytheadministrativeorgansandtheirstaff,infringinguponthelegitimaterightsandinterestsoftheadministrativecounterpartandcausingdamage,andthecompensationorganshallundertakedamagesaccordingtolaw.Answer:Ydifficulty:ATrainingcourseexercises(two)1.People'sRepublicofChina'sfreedomofcommunicationandcommunicationsecretsareprotectedbylaw.Answer:Ydifficulty:A2.,inviolationofstateregulations,theinvasionofstateaffairs,nationaldefenseconstruction,cutting-edgescienceandtechnologyinthefieldofcomputerinformationsystemsshouldbelocated).fixed-termimprisonmentofnotlessthanfiveyearsdetentionfixed-termimprisonmentofnotlessthanthreeyearsdetentionAnswer:CDdifficulty:Binviolationoftheprovisionsofthestate,inthecomputerinformationsystemstorage,processingortransmissionofdataandapplicationstodelete,modify,increasetheoperation,theconsequencesareserious).trespassoncomputerinformationsystemcrimedamagecomputerinformationsystemcrimeoffenceofdisruptingtheorderofradiocommunicationmanagementremoves,modifies,andaddscomputerinformation,systemdata,andApplicationsAnswer:Bdifficulty:C4.intentionallymakinganddisseminatingcomputervirusesandotherdestructiveproceduresthataffectthenormaloperationofthecomputersystemshallbesentencedtofixed-termimprisonmentofnotmorethanfiveyearsorcriminaldetentioninaccordancewiththelaw.theconsequencesareseriouscausesharmcausesthesystemtogowronginformationmissingAnswer:Adifficulty:Bthesupervisionandmanagementofcomputerinformationsystemsecurityworkshouldbecompleted.MinistryofinformationindustrypublicsecurityorgansProcuratorateStateDepartmentAnswer:Bdifficulty:BRegulationsofthePeople'sRepublicofChinaonPunishmentsinPublicOrderandSecurityAdministration(),inaccordancewiththeprovisionsofthecriminallawofthePeople*sRepublicofChina,constituteacrime,shallbeinvestigatedforcriminalresponsibilityaccordingtolaw;notyetcriminalpunishment,Thosewhoshouldbepunishedbypublicsecurityadministrationshallbepunishedinaccordancewiththeseregulations.disturbssocialorderimpairingpublicsafetyinfringementofcivilrightsviolationsofpublicandprivatepropertyAnswer:ABCDdifficulty:Bpenaltiesforviolationsofpublicsecurityadministrationaredividedintothefollowingthreecategories:().warningfinereeducationthroughlabourdetentionAnswer:ABDdifficulty:Corgans,groups,enterprisesorinstitutionsviolatingtheadministrationofpublicsecurityshallpunishthosewhoaredirectlyresponsible,andthosewhoareinchargeoftheunitsshall,atthesametime,punishtheofficersincharge.Answer:Ydifficulty:AthedecisionoftheStandingCommitteeoftheNationalPeople*sCongressonsafeguardingInternetsecuritywasadoptedatthe(or)secondmeetingoftheStandingCommitteeoftheNationalPeople*sCongressofthepeople*sCongressonDecember28,2000.eight,eighteennine,nineteenten,twentyeleven,twenty-oneAnswer:Bdifficulty:A10,themainpurposeofthedecisionoftheStandingCommitteeoftheNationalPeople,sCongressonsafeguardingInternetsecurityis().InordertopromoteA.promotesthehealthydevelopmentofInternetinChinasafeguardnationalsecurityandsocialpublicinterestsprotectsthelegitimaterightsandinterestsofindividuals,legalpersonsandotherorganizationsAnswer:ABCDdifficulty:B,inordertoensurethesafetyofInternetoperation,ifoneofthefollowingactsconstitutesacrime,heshallbeinvestigatedforcriminalresponsibilityinaccordancewiththerelevantprovisionsofthecriminallaw:).computerinformationsystemsthatinvadenationalaffairs,nationaldefense,andcutting-edgescienceandtechnologyintentionallyproducesandspreadscomputervirusesandotherdestructiveprograms,attackscomputer
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 建筑行業(yè)特種設(shè)備使用登記與監(jiān)督管理制度
- 代理記賬公司績效考核制度
- 病房床位訂房管理制度
- 私立醫(yī)院處方評審與監(jiān)管制度
- 應(yīng)急預(yù)案和危機(jī)管理制度
- 維修工作管理制度
- 核醫(yī)學(xué)檢查管理制度
- 科室運(yùn)行與協(xié)調(diào)管理制度
- 學(xué)校疫情防控日報告制度
- 外貿(mào)企業(yè)信息流動管理制度
- 四年級上冊生命生態(tài)安全期末復(fù)習(xí)資料
- 軌道板預(yù)制施工作業(yè)指導(dǎo)書
- 網(wǎng)絡(luò)安全等級保護(hù)之信息系統(tǒng)定級備案工作方案
- 畢業(yè)設(shè)計(論文)-基于AT89C52單片機(jī)的液晶顯示的數(shù)字鐘的設(shè)計與實(shí)現(xiàn)
- 《香包的制作》教學(xué)設(shè)計(優(yōu)質(zhì)課比賽教案)
- 郴州市屆高三第一次教學(xué)質(zhì)量監(jiān)測質(zhì)量分析報告(總)
- 《中國詩詞大會》原題——九宮格
- 步進(jìn)送料機(jī)設(shè)計終稿
- (精心整理)中國地形空白填圖
- 煙化爐(上海冶煉廠編)_圖文
- 滑坡監(jiān)測技術(shù)方案
評論
0/150
提交評論