版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
計(jì)算機(jī)網(wǎng)絡(luò)安全員培訓(xùn)考試題庫(kù)(答案)原版(Computernetwork
securitystafftrainingexaminationquestionsdatabase
(answer)original)Computernetworksecuritystafftrainingexaminationquestionsdatabase(answer)originalTrainingcourseexercises(1)Chapter1Introductionsecurityregulations,securitytechnologyandsecuritymanagementarethreemajorcomponentsofcomputerinformationsystemsecurityprotection.Answer:Ydifficulty:Athebasiccomponentsofacomputerinformationsystemare:computerentities,information,and().networkmediapeopleciphertextAnswer:Cdifficulty:Csecurity,informationsecurity,operationsecurityandpersonnelsecurity.Answer:Ydifficulty:Bfromthepointofviewofsystemengineering,computerinformationnetworkisrequired.availability,integrity,confidentialityauthenticity(nonrepudiation)reliabilityandcontrollabilitystabilityAnswer:ABCdifficulty:B5.thesecuritythreatsofcomputerinformationsystemcomefromtwoaspectsinsideandoutside.Answer:Ydifficulty:A,thevulnerabilityofcomputerinformationnetworkleadstothevulnerabilityandsecurityofinformationsociety.Answer:Ydifficulty:Ameasuresfortheimplementationofcomputerinformationsystemsecurityprotectioninclude:().A.safetyregulationssafetymanagementsecuritytechnologysafetytrainingAnswer:ABCdifficulty:B8.,thenationalpublicinformationnetworksecuritysupervisionworkisanimportantpartofpublicsecuritywork.Answer:Ydifficulty:A9.,inordertoprotectinformationsecurity,inadditiontotheinformationsecurityprotection,weshouldalsopayattentiontoimprovethesystemintrusiondetectionAbility,systemeventresponsecapability,andrapidrecoverycapabilityifthesystemiscompromisedbyintrusions.Answer:Ydifficulty:C10.OSILayerSecuritytechniquestoconsidersecuritymodels0.physicallayerdatalinklayernetworklayer,transportlayer,sessionlayerpresentationlayer,applicationlayerAnswer:ABCDdifficulty:C11.datalinklayercanbeusedAndencryption,becausedifferent1inklayerprotocolshavedifferentframeformats,sowhenencrypting,differentlinklayerprotocolsmustbedistinguished.routingintrusiondetectiondigitalsignatureaccesscontrolAnswer:Bdifficulty:Cthesecuritymechanismsadoptedinthenetworkareasfollows:().zoneprotectionencryptionandconcealmentmechanisms;authenticationandidentityauthenticationmechanisms;auditing;integrityprotectionpowercontrolandaccesscontrol;businessfill;routingcontrolnotarizationmechanism;redundancyandbackupAnswer:BCDdifficulty:D13.publickeyinfrastructure(PK1)consistsofthefollowingcomponents:().CertificationCenter;RegistrationCenterqualityinspectioncenterconsultingservicecertificateholder;user;certificateLibraryAnswer:ADdifficulty:C.,whenthepublicsecurityorgansexerciseadministrativesupervisionofcomputerinformationsystemsinothercountries,thelegalstatusofbothsidesisequal.Answer:Ndifficulty:B.,thepeople'spoliceexercisethecomputerinformationsystemsafetysupervisionrightisrepresentativeofthecountry,soitisthemainbodyoftheadministration.mandatorytechnicalstandards,isrecognizedbythestatelawsandregulations,therelativevoluntarycomplianceandimplementationoftechnicalstandards.Answer:Ndifficulty:B,thekeypointofourcomputerinformationsystemsecurityismaintenanceAndotherimportantareasofcomputerinformationsystemsecurity.nationalaffairseconomicconstructionandnationaldefenseconstructionadvancedscienceandtechnologyEducationCultureAnswer.ABCdifficulty:Baslongasthecomputerinformationsysteminourcountryanditssecurityprotectionareapplicable,theregulationsonthesafetyprotectionofcomputerinformationsystemsshallapply.Answer:Ndifficulty:AThefourthchapter,computerinformationsystemsecurityprotectionsystemNineteenThesecuritylevelistheconfirmationofthecomputerinformationsystembythenationalinformationsecuritysupervisionandadministrationdepartment.scaleimportancesecuritycapabilitynetworkstructureAnswer:Cdifficulty:BThe20.securitylevelisareflectionoftheimportanceandsensitivityofthecomputerinformationsystem.applicationareausessystemhardwaretakesafetymeasuresprocessinginformation,thepublicsecurityorgansintheInternetcafebeforetheofficialbusiness,donotneedtoconductsecurityauditsofInternetcafes.Answer:Ndifficulty:AInternetusersmustusevalidIDtousetheinternet.Answer:Ydifficulty:AInternetcafescanbeleasedtootheroperators.Answer:Ndifficulty:AInternetcafesownersandsecuritymanagementpersonneltocarryoutsafetyknowledgetraining.Answer:Ydifficulty:A26.computerinformationsystemusingunits()securitymanagementsystem.doesnotalwayshavetobebuiltcanbeestablishedshouldbeestablishedvoluntaryestablishmentresponsibleforcomputerinformationsystemsecurityspecialproductsaleslicenseapprovalandissuedthe"computerinformationsystemsecurityspecialproductsalespermit"is().NationalBureauofTechnicalSupervisionMinistryofinformationindustryPublicSecurityNetworkSupervisionBureauofMinistryofpublicsecurityDepartmentofnationalsecurityAnswer:Cdifficulty:A28.thePublicInformationNetworkSecuritySupervisionBureauoftheMinistryofpublicsecurityisresponsibleforthesaleslicenseofcomputerinformationsystemsecurityspecialproducts)work.managementapprovalandcertificationC.approvalD.ProductionsAnswer:Bdifficulty:Aacomputervirusisasetofcomputerinstructionsorprogramcodethatisprogrammedorinsertedintoacomputerprogramtodestroycomputerfunctionordestroydataandaffecttheuseofacomputer.Answer:Ndifficulty:Bacomputervirusisasetofcomputerinstructionsorprogramcodethatcan().destroyscomputerfunctiondestroyscomputerdataselfreplicationharmsthehealthofcomputeroperatorsAnswer:ABCdifficulty:C,violationsofstatelawsandregulations,endangeringthesafetyofcomputerinformationsystems,knownascomputercases.In32.,theconstructionofcomputerinformationsystemintheoperationmanagement,theimportantsafetytechnologyandsafetystandardsimplementation,systemconstructionandimplementationmeasures,preventmajorsecurity,foundillegal,accidents,andothersafetymanagementinamajorsecurityrelatedbehavior,safeevent.Answer:Ydifficulty:A33.computercasesdividedintocriminalcasesandadministrativecases,whichviolatethecriminallawofthecomputercaseiscomputercriminalcases,inviolationofadministrativeregulationsofcomputersecuritycomputeradministrativecases.Answer:Ydifficulty:AThefifthchapter,computerinformationnetworksecurityprotectionanddetectiontechnologyThe34.TCP/IPprotocolis(),andthedataisusuallyonthenetwork,anditiseasyto.publicreleaseeavesdroppinganddeceptionencryptedtransportplaincodetransferAnswer:ADBdifficulty:Cnetworkattacksgenerallyhavethreestages:().getsinformationandspreadswidelyaccesstotheinitialaccess,andthentrytogettheprivilegeofthetargetleavesthebackdoor,attacksothersystemtargets,andevenattackstheentirenetworkcollectsinformationandlooksforgoalsAnswer:DBCdifficulty:Cthecontentofintrusiondetectionmainlyincludes:().exclusiveresources,malicioususeattemptstobreakinorsuccessfullybreakinandimpersonateotheruserssecurityauditbreachessecuritypolicies,legitimateusers'leaksAnswer:BDAdifficulty:Cusingahumanintrusiondetectionsystem(IDS)todetecttime,Thefirstproblemisdecidingwheretoinstall,detect,andanalyzeintrusiondetectionsensors(Sensor)ortestengines(Engine).Answer:Ydifficulty:C,forintrusiondetectionsystems(IDS),itwouldbepointlesstodetectonlyhackerintrusionsifnot.responsemeasuresresponsemeasuresormeasurespreventionpolicyresponsedeviceAnswer:Bdifficulty:Ccomputercrimestatisticsshowthatcomputersecurityproblemsstemmainlyfrom().hackerattackscomputervirusattackssysteminternalAnswer:Cdifficulty:CThesixthchapter,theentitysecurityprotectiontechnologyandthecomputerroomtestcomputerroomisthekeyplacetoinstallthemainbodyofcomputerinformationsystem,anditisthefocalpointofwork,soweshouldstrengthenthesafetymanagementofcomputerroom.entitysecurityprotectionpersonnelmanagementmediasecurityprotectiondevicesecurityprotectionAnswer:Adifficulty:Bthecomputerroomshallconformtothenationalstandardsandtherelevantstateregulations.Constructioninthevicinityofthecomputerroomshallnotendangerthesafetyofthecomputerinformationsystem.Answer:Ydifficulty:Ainchargeofthesecurityofcomputerinformationsystemofpublicsecurityorgansandurbanconstructionandplanningdepartmentsshouldbecoordinatedwiththeconstructionunit,inthepremiseofnotharmtheinterestsofusers,formulatemeasures,reasonableconstruction,goodsafetyprotectionofcomputerinformationsystem.Answer:Ndifficulty:Aentitysecuritytechnologiesinclude:().environmentalsecuritydevicesecuritypersonnelsafetymediasecurityAnswer:ABDdifficulty:B44.,regionalsecurityshouldbeconsideredfirst(c)usedtoidentifyandaccesstheidentityoftheuserandverifyitslegality,mainlythroughspecialidentifiers,passwords,fingerprintsandsoon.visitors,holdingsphysicalaccesscontrolvisitorshavecharacteristicsvisitor,sinformationAnswer:Bdifficulty:Cantistaticmeasuresareuseofanti-staticfloor;staffarerequiredtowearanti-staticclothingandshoesintotheroomindoorrelativetemperaturerangeisasfollows:45%,65%;computerandfloorareeffectivelygroundedinstallshieldingmaterialofficeroom,officeequipmentorauxiliaryequipmentmaterialsshouldbeproducedasfaraspossibleusinglessstaticmaterialAnswer:ABDdifficulty:Acomputersystemgroundingincludes:DCground;ACworkplace;safetyprotectionground;powersupplyzerolineandlightningprotectionsite.Answer:Ndifficulty:B,theuseofshieldingroom,first,inordertoisolatetheexternalandinternalequipment,mutualelectricfield,magneticfield,electromagneticinterference,andtwoistopreventinterferencefromtheelectromagneticradiationgeneratedbythesourcetotheexternalspace.classamedia:thecontentofthemediaisthemostimportanttothe()function,cannotbereplaced,andcannotberestoredimmediatelyafterthedamage.securityoperationsystemdeviceAnswer:CDdifficulty:Btransportation,carryingormailingofcomputerinformationmediashallbesubmittedtothestateastrue(or).customsbusinesstaxfrontierdefenseAnswer:Adifficulty:Athecomputersiteistheplacewherethecomputerinformationnetworkisinstalledandoperated.Itisalsotheplacewheretheinterfaceoftheman-machinesystemisformed,andisthephysicalplacefor"human-computerinteraction”.It
isanimportantpartofourimplementation.Thepracticalinspectionofthecomputersiteisanimportantmeanstoensurethesecurityoftheinformationnetwork.A.computerinformationnetworksecurityoperationB.computerinformationnetworksecuritysupervisionB.computerinformationnetworksecuritysupervisionC.D.computerinformationnetworksecurityprotectioncomputerinformationnetworksecuritytestC.D.Answer:Bdifficulty:Bcomputersitesafetytesting,including:().temperature,humidity,dustillumination,noise,electromagneticinterference,environmentalfieldintensitygroundresistance,voltage,frequencywaveformdistortionrateanalysismethodforcorrosivegasesAnswer:ABCDdifficulty:AtheequipmentoftheinformationsystemcanpassbyatworkAndsoonradiation,produceelectromagneticleakage.Theelectromagneticsignalisreceivedasdown,afterextraction,itcanrestoretheoriginalinformation,resultingininformationsecurity.groundwiresignallineparasiticelectromagneticsignalsorharmonicsantennaAnswer.*ABCdifficulty:CTEMPESTtechnologyhasthreemainprotectionmeasures:firstistosuppress;secondistoshield;thirdistosendinterferencesignals.Atthesametime,thesystemworkswithpseudonoisetoconcealtheworkingfrequencyandinformationcharacteristicsofthesystem,sothattheinformationcontentcannotbedetectedbytheoutsideworld.Answer:Ydifficulty:Cencryptiontransmissionisaveryeffectiveandfrequentlyusedmethod,anditcansolvetheelectromagneticinformationleakageproblemoftheinputandoutputterminals.Answer:Ndifficulty:BThe55.EMCstandardisdesignedtoensure(normal)work.A.networkmediainformationsystemsandequipmentAnswer:Ddifficulty:C56)referstoallmagneticsignalsthatarenotassociatedwiththeusefulsignal,undesired,oradverselyaffectedbyelectricalandelectronicequipment.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Cdifficulty:C57(E)referstotheelectromagneticnatureofanelectronicsystemordevicethatdoesnotaffecteachotherinanelectromagneticenvironmentthatisnormallyoperating.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Adifficulty:BEMCtestsandcontrolstheelectromagneticemissionofinformationsignalsthatuserscareabout.TheTEMPESTonlytestsandconstrainsallelectromagneticemissionsofthesystemandequipment.Answer:Ndifficulty:Credsignalsarethoseoncestolen,thesignalwillcausetheuserinformationconfidential.Othersignalsarecalled“blacksignals.Answer:Ydifficulty:C,redzone:redsignaltransmissionchannelorunitcircuitcalledredzone,andviceversaisblackarea.Answer:Ydifficulty:Cradiationinterference:interferenceexistsintheformofvoltageandcurrent,andthroughthecircuit,theinterferenceiscoupledtothedevice.ConductiontrunkInterference:thepresenceofradiation,electricfield,andmagneticfieldcoupledtotheequipmentorsystembyelectromagneticfieldemission.Answer:Ndifficulty:C,thebasicprotectionofthreemethods:first,tosuppresselectromagneticemissions,takevariousmeasurestoreducethe“redzone"circuitelectromagneticemission.Thetwoisshieldingisolation,arounditusingavarietyofshieldingmaterialstomakeitattenuatedredsignalsignal,electromagneticlaunchfieldissmallenoughtomakeitdifficulttoreceive,andevencannotreceive.Thethreeisrelatedinterference(containment),takevariousmeasurestomakeinformationrelatedtoelectromagneticemissionleakageisreceivedandcannotidentify.Answer:Ydifficulty:Ccommonlyusedmethodsofelectromagneticinformationleakageareasfollows:().informationencryptioncorrelationinterferencemethodsuppressionmethod”screen"law,thatis,theairspacelawAnswer:DCBAdifficulty:Cthemostimportantsourcesofelectromagneticinterferenceare:().powercycleinterferencelightningelectromagneticpulseLEMPgridoperatingovervoltageSEMPelectrostaticdischargeESDAnswer:BCDdifficulty:Cmentionedlightningprotection,itiseasytothinkofthelightningrod.Infact,weusuallyseethelightningrodisusedtoprotectthehousefromlightningstrike,thatis,againstdirectlightning.Thecomputerinformationsystemoftheelectronicequipmentoflightningproducedbyinductionlightningprotection,sothemethodiscompletelydifferent.Answer:Ydifficulty:B,themainwaysofthunderintrusionintocomputerinformationsystemare:().InformationtransmissionchannellineintrusionpowersupplylineintrusionbuildinggroundpotentialcounterattackAnswer:BADdifficulty:Ctopreventthecomputerinformationsystembylightning,cannotexpect(),whichnotonlyprotectthecomputersystem,butincreasedthecomputersystemoflightning.isbuiltinopenspaceslightningrodbuildingheightreducescomputersystemmountingfloorsAnswer:Bdifficulty:Clightningprotectionmeasuresinallisconnectedwiththecomputerontheoutside(includingpowerlineandcommunicationlines)withspeciallightningprotectionequipment-lightningprotector,andstandardwire,topreventthegenerationofhighpotentialingroundlightningcounterattack.Answer:Ydifficulty:Blightningprotectiondeviceisdividedinto:().A.operationlightningprotectiondeviceLightningprotectiondeviceforB.communicationinterfaceC.buildinglightningprotectiondeviceLightningprotectiondeviceforD.powersupplyAnswer:BDdifficulty:Ccomputerinformationsystemprotection,simplysummarizedare:voltagesharing,shunt,shieldingandgoodgrounding.Therefore,lightningprotectiondevicesmustbereasonable).shieldconfigurationgroundconfigurationshuntconfigurationpressuresharingconfigurationAnswer:Bdifficulty:Ccomputerinformationsystemsecurityprotectionlightningovervoltageandovercurrentmustadoptadvancedtechnology,reasonableeconomy,safetyandpracticality,theabovenationalcertificationministerialspecializinginlightningprotectionequipmenttestinglaboratorytesting,andthe()withexcellentproducttypestandardGA173-1998,zcomputerinformationsystem*intheconfirmationofthelightningprotector.NationalSecurityAgencynationalqualityinspectiondepartmentadministrationofindustryandCommercepublicinformationnetworksecuritysupervisiondepartmentAnswer:Ddifficulty:Binstallationofthecomputerinformationsystemofqualified1ightningprotector,mustalsobein()beforethunderstormseasonoflightningprotector:protectiveearthingdeviceforanannualinspection,foundunqualified,shouldbetimelyrepairorreplacement.thirdyearssecondyearsannuallyD.thenAnswer:Cdifficulty:BTheseventhchapter,riskanalysistechnologyandaudittracking73.()istoconsiderthepossibleharmtotheinformationsystemcausedbyman-madeornaturalthreatfactorsandthepossiblermationsecurityanalysisoperationsafetyanalysisriskanalysissecuritymanagementanalysisAnswer:Cdifficulty:Btheriskmanagementprocesshasthreebasicelements:().A.'splanfortheaccidentChoiceofB.safetymeasuresconfirmationandidentificationeconomicriskestimation75.,thebenefitsofriskanalysisare:().helpstostrengthenscientificdecision-makingandpreventionmeasuresforsafetymanagementhelpstomakereasonableuseofthefundshelpsimprovesafetyisconducivetosafetyengineeringplanningAnswer:CABDdifficulty:Briskanalysisstepbystepis:().assetinventory;understandingthesourcesofthreatsandtheirimpactonassetvulnerability;estimatingthelikelihoodofathreatreviewsecuritypolicycalculatestheannualexpectedloss;investigatesfeasiblesafetymeasuresandtheircostoverheadcalculatesannualrevenuefromsecuritymeasures;developssecurityplansAnswer:ACDdifficulty:C,theparticipationofthesecurityplancannotbemadebyallpersonneloftheunit,buttheimplementationofthesafetyplanrequiresfullparticipation.Thisneedstocarryonthesafetyeducationtotheunit(),enhancestheirsecurityconsciousness.securitypersonnelleadingcadreallstaffmanagersAnswer:Cdifficulty:Aaudittrackingisthepreestimationofthethreatofsecurityfactorsandtheeffectivenessofpreventivemeasurestaken,andriskanalysisasameansoftrackingaftertheeventtomaintainthesafetyofthesystem.Answer:Ndifficulty:ASeventy-nineInformationsecurityauditsystemhasthefollowingfiveimportantsecurityobjectives:(1)theauditreviewofindividualobjectaccess,personalaccesstodetailedhistory,supportavarietyofprotectionmechanismofeffectiveness;(2)foundillegaluseandattempttobypassprotectionmechanism,trytorepeatthefailure;(3)finduseroperationbeyondtheirownauthority;(4)toattempttobypasssystemofprotectionmechanismofoffendersconstitutetechnicalbarriersandlegaldeterrence;(5)recordsandfoundwaystoprovideattempttobypassprotectionmechanismforusers.Answer:Ydifficulty:A80.audittrackingtechnologycansetupa"worklog"fortheoperationoftheinformationsystem.Iftheaudittrackingfunctionisstarted,theworklogcanbechanged.Itismaintainedbythesystemandmanagedbyalllevelsofsecuritymanagementatthediscretionofthepeople.Answer:Ndifficulty:BTherelationshipbetweenthe81.auditandcomputercrimeare:theestablishmentofaudittracking,topreventcomputercrime;theaudittrail,exposepossiblecomputercrime;accordingtotheaudittracking,investigationofcomputercrime;onthebasisofaudittracking,computercrimes.Answer:Ydifficulty:ATheeighthchapterisaboutthelegalresponsibilityofcomputerinformationsystemsecurityprotection.82,thelegalliabilitythattheadministrativecounterpartviolatesthecomputerinformationsystemsecurityprotectionlawmayinclude:().A.civilliabilityadministrativeresponsibilitystatecompensationliabilityAnswer:ABCdifficulty:Acomputercrimeisthebehaviorofthecomputerasatoolortocomputerassetsastheobjectofcrime,accordingtoChina,scriminallawshouldbepunished,withsocialharmbehavior.Answer:Ydifficulty:Astatecompensationcanbedividedinto().militarycompensationcriminalcompensationadministrativecompensationjudicialcompensationAnswer:BCdifficulty:Btheorganofdutyforadministrativecompensationis().administrativeorgansfortheimplementationofviolationsimplementstheinfringingpersonnelofindividualpersonnelimplementstheadministrativeorgansinwhichtheinfringingpersonnelbelongpeople,sgovernmentsatorabovethecountylevelAnswer:ACdifficulty:B,administrativecompensationreferstotheillegalexerciseoffunctionsandpowersbytheadministrativeorgansandtheirstaff,infringinguponthelegitimaterightsandinterestsoftheadministrativecounterpartandcausingdamage,andthecompensationorganshallundertakedamagesaccordingtolaw.Answer:Ydifficulty:ATrainingcourseexercises(two)1.People'sRepublicofChina'sfreedomofcommunicationandcommunicationsecretsareprotectedbylaw.Answer:Ydifficulty:A2.,inviolationofstateregulations,theinvasionofstateaffairs,nationaldefenseconstruction,cutting-edgescienceandtechnologyinthefieldofcomputerinformationsystemsshouldbelocated).fixed-termimprisonmentofnotlessthanfiveyearsdetentionfixed-termimprisonmentofnotlessthanthreeyearsdetentionAnswer:CDdifficulty:Binviolationoftheprovisionsofthestate,inthecomputerinformationsystemstorage,processingortransmissionofdataandapplicationstodelete,modify,increasetheoperation,theconsequencesareserious).trespassoncomputerinformationsystemcrimedamagecomputerinformationsystemcrimeoffenceofdisruptingtheorderofradiocommunicationmanagementremoves,modifies,andaddscomputerinformation,systemdata,andApplicationsAnswer:Bdifficulty:C4.intentionallymakinganddisseminatingcomputervirusesandotherdestructiveproceduresthataffectthenormaloperationofthecomputersystemshallbesentencedtofixed-termimprisonmentofnotmorethanfiveyearsorcriminaldetentioninaccordancewiththelaw.theconsequencesareseriouscausesharmcausesthesystemtogowronginformationmissingAnswer:Adifficulty:Bthesupervisionandmanagementofcomputerinformationsystemsecurityworkshouldbecompleted.MinistryofinformationindustrypublicsecurityorgansProcuratorateStateDepartmentAnswer:Bdifficulty:BRegulationsofthePeople'sRepublicofChinaonPunishmentsinPublicOrderandSecurityAdministration(),inaccordancewiththeprovisionsofthecriminallawofthePeople*sRepublicofChina,constituteacrime,shallbeinvestigatedforcriminalresponsibilityaccordingtolaw;notyetcriminalpunishment,Thosewhoshouldbepunishedbypublicsecurityadministrationshallbepunishedinaccordancewiththeseregulations.disturbssocialorderimpairingpublicsafetyinfringementofcivilrightsviolationsofpublicandprivatepropertyAnswer:ABCDdifficulty:Bpenaltiesforviolationsofpublicsecurityadministrationaredividedintothefollowingthreecategories:().warningfinereeducationthroughlabourdetentionAnswer:ABDdifficulty:Corgans,groups,enterprisesorinstitutionsviolatingtheadministrationofpublicsecurityshallpunishthosewhoaredirectlyresponsible,andthosewhoareinchargeoftheunitsshall,atthesametime,punishtheofficersincharge.Answer:Ydifficulty:AthedecisionoftheStandingCommitteeoftheNationalPeople*sCongressonsafeguardingInternetsecuritywasadoptedatthe(or)secondmeetingoftheStandingCommitteeoftheNationalPeople*sCongressofthepeople*sCongressonDecember28,2000.eight,eighteennine,nineteenten,twentyeleven,twenty-oneAnswer:Bdifficulty:A10,themainpurposeofthedecisionoftheStandingCommitteeoftheNationalPeople,sCongressonsafeguardingInternetsecurityis().InordertopromoteA.promotesthehealthydevelopmentofInternetinChinasafeguardnationalsecurityandsocialpublicinterestsprotectsthelegitimaterightsandinterestsofindividuals,legalpersonsandotherorganizationsAnswer:ABCDdifficulty:B,inordertoensurethesafetyofInternetoperation,ifoneofthefollowingactsconstitutesacrime,heshallbeinvestigatedforcriminalresponsibilityinaccordancewiththerelevantprovisionsofthecriminallaw:).computerinformationsystemsthatinvadenationalaffairs,nationaldefense,andcutting-edgescienceandtechnologyintentionallyproducesandspreadscomputervirusesandotherdestructiveprograms,attackscomputer
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年高科技產(chǎn)品銷(xiāo)售分紅合同范本3篇
- 2024文化藝術(shù)交流與推廣合同
- 2024年購(gòu)物中心戶外廣告位租賃合同3篇
- 2024年離婚房產(chǎn)分割及財(cái)產(chǎn)分割與子女撫養(yǎng)費(fèi)支付合同3篇
- 2024幼兒園學(xué)生接送安全與意外保險(xiǎn)合同3篇
- 2024年排水管道安裝工程安全生產(chǎn)責(zé)任合同2篇
- 2024抖音直播平臺(tái)年度網(wǎng)紅孵化合作合同范本3篇
- 2024年結(jié)婚典禮攝影合作協(xié)議
- 2024模特經(jīng)紀(jì)服務(wù)合同涵蓋形象代言與推廣3篇
- 2024學(xué)校校園土地承包與現(xiàn)代農(nóng)業(yè)項(xiàng)目合作合同3篇
- (精心整理)林海雪原閱讀題及答案
- [國(guó)企、公務(wù)員、事業(yè)單位]面試題題目及答案解析
- 2022年最全工廠供電試題考試題習(xí)題庫(kù)及參考答案
- 消毒供應(yīng)室護(hù)理質(zhì)量考核評(píng)分標(biāo)準(zhǔn)
- 《軟件工程》教案(本科)
- 粗粒土和巨粒土最大干密度記錄表及報(bào)告
- 表冷器性能計(jì)算書(shū)
- 走遍德國(guó) A1(課堂PPT)
- 照明公司個(gè)人工作總結(jié)范文
- 熱控專(zhuān)業(yè)施工質(zhì)量驗(yàn)收范圍劃分表
- 2022年sppb簡(jiǎn)易體能狀況量表
評(píng)論
0/150
提交評(píng)論