




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
計(jì)算機(jī)網(wǎng)絡(luò)安全員培訓(xùn)考試題庫(kù)(答案)原版(Computernetwork
securitystafftrainingexaminationquestionsdatabase
(answer)original)Computernetworksecuritystafftrainingexaminationquestionsdatabase(answer)originalTrainingcourseexercises(1)Chapter1Introductionsecurityregulations,securitytechnologyandsecuritymanagementarethreemajorcomponentsofcomputerinformationsystemsecurityprotection.Answer:Ydifficulty:Athebasiccomponentsofacomputerinformationsystemare:computerentities,information,and().networkmediapeopleciphertextAnswer:Cdifficulty:Csecurity,informationsecurity,operationsecurityandpersonnelsecurity.Answer:Ydifficulty:Bfromthepointofviewofsystemengineering,computerinformationnetworkisrequired.availability,integrity,confidentialityauthenticity(nonrepudiation)reliabilityandcontrollabilitystabilityAnswer:ABCdifficulty:B5.thesecuritythreatsofcomputerinformationsystemcomefromtwoaspectsinsideandoutside.Answer:Ydifficulty:A,thevulnerabilityofcomputerinformationnetworkleadstothevulnerabilityandsecurityofinformationsociety.Answer:Ydifficulty:Ameasuresfortheimplementationofcomputerinformationsystemsecurityprotectioninclude:().A.safetyregulationssafetymanagementsecuritytechnologysafetytrainingAnswer:ABCdifficulty:B8.,thenationalpublicinformationnetworksecuritysupervisionworkisanimportantpartofpublicsecuritywork.Answer:Ydifficulty:A9.,inordertoprotectinformationsecurity,inadditiontotheinformationsecurityprotection,weshouldalsopayattentiontoimprovethesystemintrusiondetectionAbility,systemeventresponsecapability,andrapidrecoverycapabilityifthesystemiscompromisedbyintrusions.Answer:Ydifficulty:C10.OSILayerSecuritytechniquestoconsidersecuritymodels0.physicallayerdatalinklayernetworklayer,transportlayer,sessionlayerpresentationlayer,applicationlayerAnswer:ABCDdifficulty:C11.datalinklayercanbeusedAndencryption,becausedifferent1inklayerprotocolshavedifferentframeformats,sowhenencrypting,differentlinklayerprotocolsmustbedistinguished.routingintrusiondetectiondigitalsignatureaccesscontrolAnswer:Bdifficulty:Cthesecuritymechanismsadoptedinthenetworkareasfollows:().zoneprotectionencryptionandconcealmentmechanisms;authenticationandidentityauthenticationmechanisms;auditing;integrityprotectionpowercontrolandaccesscontrol;businessfill;routingcontrolnotarizationmechanism;redundancyandbackupAnswer:BCDdifficulty:D13.publickeyinfrastructure(PK1)consistsofthefollowingcomponents:().CertificationCenter;RegistrationCenterqualityinspectioncenterconsultingservicecertificateholder;user;certificateLibraryAnswer:ADdifficulty:C.,whenthepublicsecurityorgansexerciseadministrativesupervisionofcomputerinformationsystemsinothercountries,thelegalstatusofbothsidesisequal.Answer:Ndifficulty:B.,thepeople'spoliceexercisethecomputerinformationsystemsafetysupervisionrightisrepresentativeofthecountry,soitisthemainbodyoftheadministration.mandatorytechnicalstandards,isrecognizedbythestatelawsandregulations,therelativevoluntarycomplianceandimplementationoftechnicalstandards.Answer:Ndifficulty:B,thekeypointofourcomputerinformationsystemsecurityismaintenanceAndotherimportantareasofcomputerinformationsystemsecurity.nationalaffairseconomicconstructionandnationaldefenseconstructionadvancedscienceandtechnologyEducationCultureAnswer.ABCdifficulty:Baslongasthecomputerinformationsysteminourcountryanditssecurityprotectionareapplicable,theregulationsonthesafetyprotectionofcomputerinformationsystemsshallapply.Answer:Ndifficulty:AThefourthchapter,computerinformationsystemsecurityprotectionsystemNineteenThesecuritylevelistheconfirmationofthecomputerinformationsystembythenationalinformationsecuritysupervisionandadministrationdepartment.scaleimportancesecuritycapabilitynetworkstructureAnswer:Cdifficulty:BThe20.securitylevelisareflectionoftheimportanceandsensitivityofthecomputerinformationsystem.applicationareausessystemhardwaretakesafetymeasuresprocessinginformation,thepublicsecurityorgansintheInternetcafebeforetheofficialbusiness,donotneedtoconductsecurityauditsofInternetcafes.Answer:Ndifficulty:AInternetusersmustusevalidIDtousetheinternet.Answer:Ydifficulty:AInternetcafescanbeleasedtootheroperators.Answer:Ndifficulty:AInternetcafesownersandsecuritymanagementpersonneltocarryoutsafetyknowledgetraining.Answer:Ydifficulty:A26.computerinformationsystemusingunits()securitymanagementsystem.doesnotalwayshavetobebuiltcanbeestablishedshouldbeestablishedvoluntaryestablishmentresponsibleforcomputerinformationsystemsecurityspecialproductsaleslicenseapprovalandissuedthe"computerinformationsystemsecurityspecialproductsalespermit"is().NationalBureauofTechnicalSupervisionMinistryofinformationindustryPublicSecurityNetworkSupervisionBureauofMinistryofpublicsecurityDepartmentofnationalsecurityAnswer:Cdifficulty:A28.thePublicInformationNetworkSecuritySupervisionBureauoftheMinistryofpublicsecurityisresponsibleforthesaleslicenseofcomputerinformationsystemsecurityspecialproducts)work.managementapprovalandcertificationC.approvalD.ProductionsAnswer:Bdifficulty:Aacomputervirusisasetofcomputerinstructionsorprogramcodethatisprogrammedorinsertedintoacomputerprogramtodestroycomputerfunctionordestroydataandaffecttheuseofacomputer.Answer:Ndifficulty:Bacomputervirusisasetofcomputerinstructionsorprogramcodethatcan().destroyscomputerfunctiondestroyscomputerdataselfreplicationharmsthehealthofcomputeroperatorsAnswer:ABCdifficulty:C,violationsofstatelawsandregulations,endangeringthesafetyofcomputerinformationsystems,knownascomputercases.In32.,theconstructionofcomputerinformationsystemintheoperationmanagement,theimportantsafetytechnologyandsafetystandardsimplementation,systemconstructionandimplementationmeasures,preventmajorsecurity,foundillegal,accidents,andothersafetymanagementinamajorsecurityrelatedbehavior,safeevent.Answer:Ydifficulty:A33.computercasesdividedintocriminalcasesandadministrativecases,whichviolatethecriminallawofthecomputercaseiscomputercriminalcases,inviolationofadministrativeregulationsofcomputersecuritycomputeradministrativecases.Answer:Ydifficulty:AThefifthchapter,computerinformationnetworksecurityprotectionanddetectiontechnologyThe34.TCP/IPprotocolis(),andthedataisusuallyonthenetwork,anditiseasyto.publicreleaseeavesdroppinganddeceptionencryptedtransportplaincodetransferAnswer:ADBdifficulty:Cnetworkattacksgenerallyhavethreestages:().getsinformationandspreadswidelyaccesstotheinitialaccess,andthentrytogettheprivilegeofthetargetleavesthebackdoor,attacksothersystemtargets,andevenattackstheentirenetworkcollectsinformationandlooksforgoalsAnswer:DBCdifficulty:Cthecontentofintrusiondetectionmainlyincludes:().exclusiveresources,malicioususeattemptstobreakinorsuccessfullybreakinandimpersonateotheruserssecurityauditbreachessecuritypolicies,legitimateusers'leaksAnswer:BDAdifficulty:Cusingahumanintrusiondetectionsystem(IDS)todetecttime,Thefirstproblemisdecidingwheretoinstall,detect,andanalyzeintrusiondetectionsensors(Sensor)ortestengines(Engine).Answer:Ydifficulty:C,forintrusiondetectionsystems(IDS),itwouldbepointlesstodetectonlyhackerintrusionsifnot.responsemeasuresresponsemeasuresormeasurespreventionpolicyresponsedeviceAnswer:Bdifficulty:Ccomputercrimestatisticsshowthatcomputersecurityproblemsstemmainlyfrom().hackerattackscomputervirusattackssysteminternalAnswer:Cdifficulty:CThesixthchapter,theentitysecurityprotectiontechnologyandthecomputerroomtestcomputerroomisthekeyplacetoinstallthemainbodyofcomputerinformationsystem,anditisthefocalpointofwork,soweshouldstrengthenthesafetymanagementofcomputerroom.entitysecurityprotectionpersonnelmanagementmediasecurityprotectiondevicesecurityprotectionAnswer:Adifficulty:Bthecomputerroomshallconformtothenationalstandardsandtherelevantstateregulations.Constructioninthevicinityofthecomputerroomshallnotendangerthesafetyofthecomputerinformationsystem.Answer:Ydifficulty:Ainchargeofthesecurityofcomputerinformationsystemofpublicsecurityorgansandurbanconstructionandplanningdepartmentsshouldbecoordinatedwiththeconstructionunit,inthepremiseofnotharmtheinterestsofusers,formulatemeasures,reasonableconstruction,goodsafetyprotectionofcomputerinformationsystem.Answer:Ndifficulty:Aentitysecuritytechnologiesinclude:().environmentalsecuritydevicesecuritypersonnelsafetymediasecurityAnswer:ABDdifficulty:B44.,regionalsecurityshouldbeconsideredfirst(c)usedtoidentifyandaccesstheidentityoftheuserandverifyitslegality,mainlythroughspecialidentifiers,passwords,fingerprintsandsoon.visitors,holdingsphysicalaccesscontrolvisitorshavecharacteristicsvisitor,sinformationAnswer:Bdifficulty:Cantistaticmeasuresareuseofanti-staticfloor;staffarerequiredtowearanti-staticclothingandshoesintotheroomindoorrelativetemperaturerangeisasfollows:45%,65%;computerandfloorareeffectivelygroundedinstallshieldingmaterialofficeroom,officeequipmentorauxiliaryequipmentmaterialsshouldbeproducedasfaraspossibleusinglessstaticmaterialAnswer:ABDdifficulty:Acomputersystemgroundingincludes:DCground;ACworkplace;safetyprotectionground;powersupplyzerolineandlightningprotectionsite.Answer:Ndifficulty:B,theuseofshieldingroom,first,inordertoisolatetheexternalandinternalequipment,mutualelectricfield,magneticfield,electromagneticinterference,andtwoistopreventinterferencefromtheelectromagneticradiationgeneratedbythesourcetotheexternalspace.classamedia:thecontentofthemediaisthemostimportanttothe()function,cannotbereplaced,andcannotberestoredimmediatelyafterthedamage.securityoperationsystemdeviceAnswer:CDdifficulty:Btransportation,carryingormailingofcomputerinformationmediashallbesubmittedtothestateastrue(or).customsbusinesstaxfrontierdefenseAnswer:Adifficulty:Athecomputersiteistheplacewherethecomputerinformationnetworkisinstalledandoperated.Itisalsotheplacewheretheinterfaceoftheman-machinesystemisformed,andisthephysicalplacefor"human-computerinteraction”.It
isanimportantpartofourimplementation.Thepracticalinspectionofthecomputersiteisanimportantmeanstoensurethesecurityoftheinformationnetwork.A.computerinformationnetworksecurityoperationB.computerinformationnetworksecuritysupervisionB.computerinformationnetworksecuritysupervisionC.D.computerinformationnetworksecurityprotectioncomputerinformationnetworksecuritytestC.D.Answer:Bdifficulty:Bcomputersitesafetytesting,including:().temperature,humidity,dustillumination,noise,electromagneticinterference,environmentalfieldintensitygroundresistance,voltage,frequencywaveformdistortionrateanalysismethodforcorrosivegasesAnswer:ABCDdifficulty:AtheequipmentoftheinformationsystemcanpassbyatworkAndsoonradiation,produceelectromagneticleakage.Theelectromagneticsignalisreceivedasdown,afterextraction,itcanrestoretheoriginalinformation,resultingininformationsecurity.groundwiresignallineparasiticelectromagneticsignalsorharmonicsantennaAnswer.*ABCdifficulty:CTEMPESTtechnologyhasthreemainprotectionmeasures:firstistosuppress;secondistoshield;thirdistosendinterferencesignals.Atthesametime,thesystemworkswithpseudonoisetoconcealtheworkingfrequencyandinformationcharacteristicsofthesystem,sothattheinformationcontentcannotbedetectedbytheoutsideworld.Answer:Ydifficulty:Cencryptiontransmissionisaveryeffectiveandfrequentlyusedmethod,anditcansolvetheelectromagneticinformationleakageproblemoftheinputandoutputterminals.Answer:Ndifficulty:BThe55.EMCstandardisdesignedtoensure(normal)work.A.networkmediainformationsystemsandequipmentAnswer:Ddifficulty:C56)referstoallmagneticsignalsthatarenotassociatedwiththeusefulsignal,undesired,oradverselyaffectedbyelectricalandelectronicequipment.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Cdifficulty:C57(E)referstotheelectromagneticnatureofanelectronicsystemordevicethatdoesnotaffecteachotherinanelectromagneticenvironmentthatisnormallyoperating.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Adifficulty:BEMCtestsandcontrolstheelectromagneticemissionofinformationsignalsthatuserscareabout.TheTEMPESTonlytestsandconstrainsallelectromagneticemissionsofthesystemandequipment.Answer:Ndifficulty:Credsignalsarethoseoncestolen,thesignalwillcausetheuserinformationconfidential.Othersignalsarecalled“blacksignals.Answer:Ydifficulty:C,redzone:redsignaltransmissionchannelorunitcircuitcalledredzone,andviceversaisblackarea.Answer:Ydifficulty:Cradiationinterference:interferenceexistsintheformofvoltageandcurrent,andthroughthecircuit,theinterferenceiscoupledtothedevice.ConductiontrunkInterference:thepresenceofradiation,electricfield,andmagneticfieldcoupledtotheequipmentorsystembyelectromagneticfieldemission.Answer:Ndifficulty:C,thebasicprotectionofthreemethods:first,tosuppresselectromagneticemissions,takevariousmeasurestoreducethe“redzone"circuitelectromagneticemission.Thetwoisshieldingisolation,arounditusingavarietyofshieldingmaterialstomakeitattenuatedredsignalsignal,electromagneticlaunchfieldissmallenoughtomakeitdifficulttoreceive,andevencannotreceive.Thethreeisrelatedinterference(containment),takevariousmeasurestomakeinformationrelatedtoelectromagneticemissionleakageisreceivedandcannotidentify.Answer:Ydifficulty:Ccommonlyusedmethodsofelectromagneticinformationleakageareasfollows:().informationencryptioncorrelationinterferencemethodsuppressionmethod”screen"law,thatis,theairspacelawAnswer:DCBAdifficulty:Cthemostimportantsourcesofelectromagneticinterferenceare:().powercycleinterferencelightningelectromagneticpulseLEMPgridoperatingovervoltageSEMPelectrostaticdischargeESDAnswer:BCDdifficulty:Cmentionedlightningprotection,itiseasytothinkofthelightningrod.Infact,weusuallyseethelightningrodisusedtoprotectthehousefromlightningstrike,thatis,againstdirectlightning.Thecomputerinformationsystemoftheelectronicequipmentoflightningproducedbyinductionlightningprotection,sothemethodiscompletelydifferent.Answer:Ydifficulty:B,themainwaysofthunderintrusionintocomputerinformationsystemare:().InformationtransmissionchannellineintrusionpowersupplylineintrusionbuildinggroundpotentialcounterattackAnswer:BADdifficulty:Ctopreventthecomputerinformationsystembylightning,cannotexpect(),whichnotonlyprotectthecomputersystem,butincreasedthecomputersystemoflightning.isbuiltinopenspaceslightningrodbuildingheightreducescomputersystemmountingfloorsAnswer:Bdifficulty:Clightningprotectionmeasuresinallisconnectedwiththecomputerontheoutside(includingpowerlineandcommunicationlines)withspeciallightningprotectionequipment-lightningprotector,andstandardwire,topreventthegenerationofhighpotentialingroundlightningcounterattack.Answer:Ydifficulty:Blightningprotectiondeviceisdividedinto:().A.operationlightningprotectiondeviceLightningprotectiondeviceforB.communicationinterfaceC.buildinglightningprotectiondeviceLightningprotectiondeviceforD.powersupplyAnswer:BDdifficulty:Ccomputerinformationsystemprotection,simplysummarizedare:voltagesharing,shunt,shieldingandgoodgrounding.Therefore,lightningprotectiondevicesmustbereasonable).shieldconfigurationgroundconfigurationshuntconfigurationpressuresharingconfigurationAnswer:Bdifficulty:Ccomputerinformationsystemsecurityprotectionlightningovervoltageandovercurrentmustadoptadvancedtechnology,reasonableeconomy,safetyandpracticality,theabovenationalcertificationministerialspecializinginlightningprotectionequipmenttestinglaboratorytesting,andthe()withexcellentproducttypestandardGA173-1998,zcomputerinformationsystem*intheconfirmationofthelightningprotector.NationalSecurityAgencynationalqualityinspectiondepartmentadministrationofindustryandCommercepublicinformationnetworksecuritysupervisiondepartmentAnswer:Ddifficulty:Binstallationofthecomputerinformationsystemofqualified1ightningprotector,mustalsobein()beforethunderstormseasonoflightningprotector:protectiveearthingdeviceforanannualinspection,foundunqualified,shouldbetimelyrepairorreplacement.thirdyearssecondyearsannuallyD.thenAnswer:Cdifficulty:BTheseventhchapter,riskanalysistechnologyandaudittracking73.()istoconsiderthepossibleharmtotheinformationsystemcausedbyman-madeornaturalthreatfactorsandthepossiblermationsecurityanalysisoperationsafetyanalysisriskanalysissecuritymanagementanalysisAnswer:Cdifficulty:Btheriskmanagementprocesshasthreebasicelements:().A.'splanfortheaccidentChoiceofB.safetymeasuresconfirmationandidentificationeconomicriskestimation75.,thebenefitsofriskanalysisare:().helpstostrengthenscientificdecision-makingandpreventionmeasuresforsafetymanagementhelpstomakereasonableuseofthefundshelpsimprovesafetyisconducivetosafetyengineeringplanningAnswer:CABDdifficulty:Briskanalysisstepbystepis:().assetinventory;understandingthesourcesofthreatsandtheirimpactonassetvulnerability;estimatingthelikelihoodofathreatreviewsecuritypolicycalculatestheannualexpectedloss;investigatesfeasiblesafetymeasuresandtheircostoverheadcalculatesannualrevenuefromsecuritymeasures;developssecurityplansAnswer:ACDdifficulty:C,theparticipationofthesecurityplancannotbemadebyallpersonneloftheunit,buttheimplementationofthesafetyplanrequiresfullparticipation.Thisneedstocarryonthesafetyeducationtotheunit(),enhancestheirsecurityconsciousness.securitypersonnelleadingcadreallstaffmanagersAnswer:Cdifficulty:Aaudittrackingisthepreestimationofthethreatofsecurityfactorsandtheeffectivenessofpreventivemeasurestaken,andriskanalysisasameansoftrackingaftertheeventtomaintainthesafetyofthesystem.Answer:Ndifficulty:ASeventy-nineInformationsecurityauditsystemhasthefollowingfiveimportantsecurityobjectives:(1)theauditreviewofindividualobjectaccess,personalaccesstodetailedhistory,supportavarietyofprotectionmechanismofeffectiveness;(2)foundillegaluseandattempttobypassprotectionmechanism,trytorepeatthefailure;(3)finduseroperationbeyondtheirownauthority;(4)toattempttobypasssystemofprotectionmechanismofoffendersconstitutetechnicalbarriersandlegaldeterrence;(5)recordsandfoundwaystoprovideattempttobypassprotectionmechanismforusers.Answer:Ydifficulty:A80.audittrackingtechnologycansetupa"worklog"fortheoperationoftheinformationsystem.Iftheaudittrackingfunctionisstarted,theworklogcanbechanged.Itismaintainedbythesystemandmanagedbyalllevelsofsecuritymanagementatthediscretionofthepeople.Answer:Ndifficulty:BTherelationshipbetweenthe81.auditandcomputercrimeare:theestablishmentofaudittracking,topreventcomputercrime;theaudittrail,exposepossiblecomputercrime;accordingtotheaudittracking,investigationofcomputercrime;onthebasisofaudittracking,computercrimes.Answer:Ydifficulty:ATheeighthchapterisaboutthelegalresponsibilityofcomputerinformationsystemsecurityprotection.82,thelegalliabilitythattheadministrativecounterpartviolatesthecomputerinformationsystemsecurityprotectionlawmayinclude:().A.civilliabilityadministrativeresponsibilitystatecompensationliabilityAnswer:ABCdifficulty:Acomputercrimeisthebehaviorofthecomputerasatoolortocomputerassetsastheobjectofcrime,accordingtoChina,scriminallawshouldbepunished,withsocialharmbehavior.Answer:Ydifficulty:Astatecompensationcanbedividedinto().militarycompensationcriminalcompensationadministrativecompensationjudicialcompensationAnswer:BCdifficulty:Btheorganofdutyforadministrativecompensationis().administrativeorgansfortheimplementationofviolationsimplementstheinfringingpersonnelofindividualpersonnelimplementstheadministrativeorgansinwhichtheinfringingpersonnelbelongpeople,sgovernmentsatorabovethecountylevelAnswer:ACdifficulty:B,administrativecompensationreferstotheillegalexerciseoffunctionsandpowersbytheadministrativeorgansandtheirstaff,infringinguponthelegitimaterightsandinterestsoftheadministrativecounterpartandcausingdamage,andthecompensationorganshallundertakedamagesaccordingtolaw.Answer:Ydifficulty:ATrainingcourseexercises(two)1.People'sRepublicofChina'sfreedomofcommunicationandcommunicationsecretsareprotectedbylaw.Answer:Ydifficulty:A2.,inviolationofstateregulations,theinvasionofstateaffairs,nationaldefenseconstruction,cutting-edgescienceandtechnologyinthefieldofcomputerinformationsystemsshouldbelocated).fixed-termimprisonmentofnotlessthanfiveyearsdetentionfixed-termimprisonmentofnotlessthanthreeyearsdetentionAnswer:CDdifficulty:Binviolationoftheprovisionsofthestate,inthecomputerinformationsystemstorage,processingortransmissionofdataandapplicationstodelete,modify,increasetheoperation,theconsequencesareserious).trespassoncomputerinformationsystemcrimedamagecomputerinformationsystemcrimeoffenceofdisruptingtheorderofradiocommunicationmanagementremoves,modifies,andaddscomputerinformation,systemdata,andApplicationsAnswer:Bdifficulty:C4.intentionallymakinganddisseminatingcomputervirusesandotherdestructiveproceduresthataffectthenormaloperationofthecomputersystemshallbesentencedtofixed-termimprisonmentofnotmorethanfiveyearsorcriminaldetentioninaccordancewiththelaw.theconsequencesareseriouscausesharmcausesthesystemtogowronginformationmissingAnswer:Adifficulty:Bthesupervisionandmanagementofcomputerinformationsystemsecurityworkshouldbecompleted.MinistryofinformationindustrypublicsecurityorgansProcuratorateStateDepartmentAnswer:Bdifficulty:BRegulationsofthePeople'sRepublicofChinaonPunishmentsinPublicOrderandSecurityAdministration(),inaccordancewiththeprovisionsofthecriminallawofthePeople*sRepublicofChina,constituteacrime,shallbeinvestigatedforcriminalresponsibilityaccordingtolaw;notyetcriminalpunishment,Thosewhoshouldbepunishedbypublicsecurityadministrationshallbepunishedinaccordancewiththeseregulations.disturbssocialorderimpairingpublicsafetyinfringementofcivilrightsviolationsofpublicandprivatepropertyAnswer:ABCDdifficulty:Bpenaltiesforviolationsofpublicsecurityadministrationaredividedintothefollowingthreecategories:().warningfinereeducationthroughlabourdetentionAnswer:ABDdifficulty:Corgans,groups,enterprisesorinstitutionsviolatingtheadministrationofpublicsecurityshallpunishthosewhoaredirectlyresponsible,andthosewhoareinchargeoftheunitsshall,atthesametime,punishtheofficersincharge.Answer:Ydifficulty:AthedecisionoftheStandingCommitteeoftheNationalPeople*sCongressonsafeguardingInternetsecuritywasadoptedatthe(or)secondmeetingoftheStandingCommitteeoftheNationalPeople*sCongressofthepeople*sCongressonDecember28,2000.eight,eighteennine,nineteenten,twentyeleven,twenty-oneAnswer:Bdifficulty:A10,themainpurposeofthedecisionoftheStandingCommitteeoftheNationalPeople,sCongressonsafeguardingInternetsecurityis().InordertopromoteA.promotesthehealthydevelopmentofInternetinChinasafeguardnationalsecurityandsocialpublicinterestsprotectsthelegitimaterightsandinterestsofindividuals,legalpersonsandotherorganizationsAnswer:ABCDdifficulty:B,inordertoensurethesafetyofInternetoperation,ifoneofthefollowingactsconstitutesacrime,heshallbeinvestigatedforcriminalresponsibilityinaccordancewiththerelevantprovisionsofthecriminallaw:).computerinformationsystemsthatinvadenationalaffairs,nationaldefense,andcutting-edgescienceandtechnologyintentionallyproducesandspreadscomputervirusesandotherdestructiveprograms,attackscomputer
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025福建省晉江圳源環(huán)境科技有限責(zé)任公司招聘6人筆試參考題庫(kù)附帶答案詳解
- 長(zhǎng)沙航空職業(yè)技術(shù)學(xué)院《精細(xì)有機(jī)合成單元反應(yīng)》2023-2024學(xué)年第二學(xué)期期末試卷
- 天津師范大學(xué)《檢驗(yàn)儀器學(xué)》2023-2024學(xué)年第二學(xué)期期末試卷
- 內(nèi)蒙古豐州職業(yè)學(xué)院《生物化學(xué)(Ⅰ)》2023-2024學(xué)年第二學(xué)期期末試卷
- 內(nèi)蒙古民族大學(xué)《層次局部解剖學(xué)》2023-2024學(xué)年第二學(xué)期期末試卷
- 新星職業(yè)技術(shù)學(xué)院《模擬電子技術(shù)課程設(shè)計(jì)》2023-2024學(xué)年第二學(xué)期期末試卷
- 新星職業(yè)技術(shù)學(xué)院《園林工程含測(cè)量》2023-2024學(xué)年第二學(xué)期期末試卷
- 達(dá)州中醫(yī)藥職業(yè)學(xué)院《數(shù)字健康傳播》2023-2024學(xué)年第二學(xué)期期末試卷
- 湖北民族大學(xué)《交通大數(shù)據(jù)分析》2023-2024學(xué)年第二學(xué)期期末試卷
- 寧波大學(xué)科學(xué)技術(shù)學(xué)院《單片機(jī)技術(shù)及應(yīng)用(C)》2023-2024學(xué)年第二學(xué)期期末試卷
- 2025年江蘇高中物理學(xué)業(yè)水平合格性考試試卷試題(含答案解析)
- 工程質(zhì)量檢測(cè)監(jiān)理制度
- 代持房屋合作協(xié)議書范本
- 《西廂記》完整版本
- DISC性格與能力測(cè)試題及答案解析
- Module 6 Unit 2 Happy Mid-Autumn Festival(教學(xué)設(shè)計(jì))-2024-2025學(xué)年外研版(三起)英語(yǔ)四年級(jí)上冊(cè)
- 2024年巴黎奧運(yùn)會(huì)課件
- 2024至2030年中國(guó)高速AOI市場(chǎng)占有率調(diào)查及投資價(jià)值評(píng)估報(bào)告
- 2024年秋新北師大版七年級(jí)上冊(cè)數(shù)學(xué)教學(xué)課件 5.1 認(rèn)識(shí)方程
- 諫逐客書-同步練習(xí) 高一下學(xué)期語(yǔ)文文言文閱讀 (統(tǒng)編版必修下冊(cè))
- 汽車保養(yǎng)與洗車行業(yè)并購(gòu)與重組研究
評(píng)論
0/150
提交評(píng)論