"Don't realize that risks are the biggest risk. As the saying goes, 'Diseases arise from what is neglected, and disasters arise from the subtle'." Holding a cybersecurity publicity week and improving the awareness and skills of the whole nation's cybersecurity are important conte

2025/02/1020:42:42 technology 1761

"Don't realize that risks are the biggest risk. As the saying goes, "Suffering comes from neglect, disasters come from subtleties."

html From September 5th to 11th, 2022 National Cyber ​​Security Promotion Week will be unified nationwide : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Carry out. Holding a cybersecurity publicity week and improving the public's awareness and skills of cybersecurity are important contents of national cybersecurity work. General Secretary Xi Jinping has repeatedly emphasized the importance of network security awareness and put forward specific requirements for strengthening network security awareness.

Come and learn with Sister Ning, General Secretary Xi Jinping’s important statement on network security~

0

For this network security manual, please check

Together to improve network security awareness

Build a network security line together

html ml20

Network security publicity During the week of transmission,

Campus Day, Telecom Day, Rule of Law

Financial Day, Youth Day, Personal Information Protection Day

Six major theme days, draw all the network knowledge in one place

"Personal Information Protection Day" event

will be held online on the same day (September 11)

Q&A

Question bank Here

Let’s take notes together!

. Personal information is various information recorded electronically or otherwise that can identify a specific natural person individually or in combination with other information, including but not limited to ________ of natural persons, etc.

A. Name, date of birth, ID number, biometric information

B. Address, phone number, email

C. Health information, whereabouts information

C. 0D. The above are all

Reference answer: D

. Collected for epidemic prevention and control and disease prevention Personal information shall not be used for other purposes. No unit or individual may disclose personal information such as name, age, ID number, telephone number, etc. without the consent of the person being collected, except for those who have been desensitized due to joint prevention and control work.

A. Correct

B. Error

Reference answer: A

. Network operators shall not disclose, tamper with or damage the personal information they collect; they shall not provide personal information to others without the consent of ______. However, this does not apply to the processing where a particular individual cannot be identified and cannot be restored.

A. I am

B. I am

C. The person collected

D. National competent department

Reference answer: C

. During the epidemic prevention and control period, a company collected employee's whereabouts information through an APP without the permission of its employees. The company explicitly infringes on employees' ______.

A.Personal rights

B.Health rights

C.Privacy rights

D.Reputation rights

D.Reputation rights

Reference answer: C

, " Civil Code " stipulates: Natural persons find that the information processor violates the provisions of laws, administrative regulations or the agreement between the two parties to process their personal information , have the right to request information processor to delete it in time.

A. Correct

B. Error

Reference answer: A

. The Civil Code stipulates that patients' _______ is included in the confidentiality scope of medical institutions. Those who disclose case information without the patient's consent should bear the responsibility for infringement of .

A.Health information

B.Personal information

C.Medical information

D. Whereabouts information

Reference answer: B

. During the epidemic prevention and control period, illegal infringement of citizens' personal information may lead to ______ legal consequences?

A. Civil tort liability

B. Administrative penalties

C. Criminal liability

D. All of the above may be

Reference answer: D

8. Xue Moumou used the website to make a mask appointment to induce others to fill in the name, ID number, Mobile phone number and other information will be posted to the public through your WeChat Moments. Xue Moumou's behavior constitutes ______.

A. Crime of infringing on citizens' personal rights

B. Infringing on citizens' democratic sovereignty

C. Crime of infringing on citizens' personal information

Reference answer: C

9. During the epidemic prevention and control period, institutions that collect or grasp personal information must be responsible for the _____ of personal information and adopt strict management and technical protection measures to prevent theft and leakage.

A. Real and valid

B. Security protection

C. Real-time update

Reference answer: B

0. The following behaviors are manifestations of clear infringement of privacy rights: ______.

A. Often harassing calls to others at night to infringe on the peace of others' private life.

B. Install a camera on the neighbor's window to peek at the neighbor's daily life.

C. Publish information about others suffering from infectious diseases on the Internet.

D. All of the above are

Reference answer: D

1. Xiao Liu discovered that an online ticket purchase platform had not allowed her Xu revealed her ride information. According to relevant regulations, the network operator violated the provisions of laws, administrative regulations or both parties' Xiao Liu has the right to request the network operator to collect and use his personal information.

A.Delete

B.Correct

C.Protect

D.Revoke

Reference answer: A

2. ______ is a piece of malicious code with special functions hidden in normal programs. It has functions such as destroying and deleting files, sending passwords, and recording keyboards.

A.Trojan

B.Word

C.Virus

Registration Test answer: A

3, ______ is a way to lock user equipment, encrypt user files, etc., which makes user data assets or computing resources impossible to use normally, and use this as a condition to the user Malware that ransoms money.

A. Ransomware

B. Virus

Reference answer: A

4. If the information network is used to slander others, the same defamation information is actually clicked, viewed more than 5,000 times, or forwarded more than 500 times, it should be deemed as ______.

A. The plot is mild

B. It does not have much impact

C. The plot is severe

D. No fault

Reference answer: C

5. One day, you received a call and told you that there is an investment project with an annual return of 60%, but the share is limited. The following The correct approach is:

A. Buy it quickly, and if you are late, you won’t be able to buy

B. Try it for a few months first, and if you do get the money, then add additional investment in

C. Beware of " Ponzi fraud Bureau ”, avoid economic losses

D. Convince relatives and friends Friends invest together

Reference answer: C

6. The following behaviors of using smartphones are at risk:

A. Obtain system permissions to install a better system

B. Set the lock screen password and use biometric secondary authentication

C. Check regularly Kill viruses, clean up junk files

D. Set application permissions, reject some unnecessary permissions application

Answer: A

7. When the prompt pops up on the screen that your phone is infected with a virus, and the prompt message contains your accurate model and phone Hardware information reminds you that when installing antivirus software, the following error is:

A. Follow the link provided by the prompt to download the antivirus software and antivirus

B as soon as possible. Confirm whether the prompt is popped up by the installed antivirus software to avoid encountering fake antivirus software. Scam

C. Don't click on the pop-up link

D easily. Try to close the current browser tag and observe whether the prompt disappears

Reference answer: A

8. Regarding the release of dangerous goods information, the following statement is correct ______.

A. Individuals can publish information on dangerous goods on the Internet

B. Any unit or individual is prohibited from publishing information on dangerous goods manufacturing methods on the Internet

C. Dangerous goods production units can publish information on the Internet Information on the method of manufacturing hazardous goods

Reference answer: B

9 , When a certain website absorbs members, it requires the corresponding membership fee to be paid. After payment, the website will give the purchaser a member number and a member "nickname", and the purchaser will officially become a member of the website. After becoming a member, you can freely develop the offline line and receive commissions to form a superior and subordinate relationship that is copied by 55. This behavior belongs to ______.

A. Online MLM

B. Phishing

C. Network Attack

D. Network fraud

Reference answer: A

0, "can't get in", "can't take away", "can't understand", "can't change", "can't get out" are network information The purpose of safety construction. Among them, ______ technology can ensure that the data is "unable to understand".

A. Data encryption

B. Identity authentication

C. Data integrity

D. Access control

. Reference answer: A

1. The following statement about digital currency is correct:

A. Bitcoin payment is me The legal digital currency payment method of the country

B. Use Blockchain technology can ensure that digital currency is absolutely safe

C. After the Bitcoin account is lost, you can apply for a password to the bank to retrieve

D. Digital currency still has network security risks

Reference answer: D

2. Regarding "Broiler", the following statement is correct yes?

A. The machine that initiates active attack

B. The machine that is implanted by a hacker in a Trojan. The hacker controls the broiler to participate in the attack

C through the Trojan control end. Users usually voluntarily become broiler

D. Broiler cannot launch an attack

Reference answer: B

3. Using the network and computer At the time, the most commonly used authentication method is:

A. Username/password authentication

B. Fingerprint authentication

C.CA authentication

D. Dynamic password authentication

Reference answer: A

4. The procurement of network and information system related to national security should be _________ of network and information system. After a cybersecurity review.

A. Important network products and services

B. All terminal equipment

C. Laptop , desktop computers, etc.

D. Remote test

Reference answer: A

5, WeChat groups and QQ groups can't do whatever you want, just say whatever you want What to say, Internet group information service providers should establish a blacklist management system, include groups with serious violations and ______ in blacklists, restrict group service functions, keep relevant records, and report to the relevant competent authorities.

A.Creator

B.Manager

C.Member

D.Above are all

Reference answer: D

6. Xiao Chen downloaded a paid knowledge program from Himalaya Radio from the Internet and successfully activated it with the activation code searched online. His behavior belongs to _______.

A. Infringement of copyright

B. Infringement of trademark rights

C. Infringement of patent rights

D. Does not constitute infringement of rights

Reference answer: A

7. Xiao Ming met a netizen on a social platform. The two chatted happily, and felt that they had met too late. . One day, this netizen said that the capital turnover at hand was not effective, so he asked Xiao Ming to provide private information such as his bank account and ID card. Xiao Ming's most suitable method is ______.

A. Netizens must have ill-thinking plans, and call the police immediately

B. There are many traps on the Internet, ignore

C. Only tell netizens their own bank account

D. Only provide a copy of your ID card

Reference answer: B

8. There is a website, just open it , the computer may be infected with Trojan virus . The professional name of this website is ______.

A.Phone website

B.Hangma website

C.Game website

D.Portrait website

D.Portrait website

Reference answer: B

9. If one day you observe under the Windows system, there is an "recycling bin" that does not exist in the USB disk. The most likely cause of icons or folders is:

A. U disk is damaged

B. Infected with virus

C. Disk fragmentation caused by

D. There are junk files on the USB disk that have not been completely cleaned

Reference answer: B

0. At present, more and more People who submit resumes online are looking for jobs. Which of the following behaviors is incorrect?

A. Carefully choose the job search website and verify that the email address to confirm that the resume is the company's real email address

B. In order to increase the authenticity of the resume, job seekers should fill in their specific information in detail, such as home address, ID number, etc.

C. Do not details on your resume Fill in your specific information, such as home address, ID number, etc.

Reference answer: B

1. The security practices when using WeChat are:

A. Be careful when posting photos in WeChat Moments, and do not post photos containing personal information

B. Share photos by setting up groups

C. Turn off the "People Nearby" function in WeChat to avoid accidentally leaking personal information and being used by criminals to commit fraud

D. The above are all

parameters Test answer: D

2. You often encounter various networks in your life Questionnaire, shopping lottery, or application for free mailing information, applying for membership cards and other activities. The following are correct:

A. In order to improve the winning rate or selection rate, you should fill in the detailed contact information and home address and other personal information

B. Do not disclose the specific details Personal information

C. Fill in the real personal information of good friends

Reference answer: B

3. The following statements about privacy rights , the wrong thing is ______

A. In the Internet age, the protection of privacy rights has been greatly impacted

B. Although the Internet world is different from the real world , but it also needs to protect personal privacy

C. Since the network is a virtual world, there is no need to protect personal privacy on the Internet

D. You can use the law to protect network privacy rights

reference Answer: C

4. When you are about to log in to the computer system, next to it Someone is watching you. In order to prevent sensitive information from being "shoulder-sighted", the correct way is:

A. I'm sorry to say anything, I believe that the other party is a friendly and upright

B. I kindly remind the other party to avoid it, or use my body to block

C . Fiercely signaled the other party to walk away and immediately reported the security department that this person is suspicious

D. Illegally fake input of some characters on the keyboard to prevent being peeked

Reference answer: B

5. The following ______ does not belong to the personal account password settings should be followed. safety principles.

A. Use your birthday date as password

B. Set the long password

C. Choose irregular combination of numbers, letters and symbols

D .Replace

Reference answer: A

6. To prevent computer virus infection and spread, it should not be done in daily applications. The following is:

A. Install and run the regular antivirus software

B. Do not click or open emails and links of unknown origin

C. Use to move the storage medium Antivirus

D. Lend the computer to others at will to use

Reference answer: D

7 , In order to protect personal computer security and data security, the wrong approach is:

A. Install antivirus, intrusion and other security protection software

B. Set up the computer login password at will and use

C for a long time. Important data encryption memory and regularly backup

D. Lock the personal computer when leaving

Reference answer: B

8. Xiao Zhao received an email of unknown origin, and the attachment he carried contained executable . Regarding how to deal with this email, friends gave Xiao Zhao some suggestions. The error is:

A. You cannot open

B before installing antivirus software. It is likely to contain malware, and you can delete the email directly and completely. tml0C. Forward to friends and request friends Help antivirus

Reference answer: C

9. There is no selfie or video chat, but the light of computer camera is always on. What might be the reason:

A. The camera is broken

B. The computer is broken

C. It should have been lighted up

D. Maybe he was hit by a Trojan and was being peeped by a hacker

Reference answer: D

0, a computer installed After the antivirus and firewall software:

A. Don’t be afraid of any virus attacking

B. Don’t be afraid of any phishing attack

C. Don’t be afraid of any bad information

D. Only by cooperating with good Internet access behavior can the computer be effectively protected

Reference answer: D

1. What is the safest behavior in daily life______?

A. Scan the coupon QR code for mobile phone

B. Connect to free WiFi

C. Open the mobile WiFi automatic connection function

D. Scan the other party’s QR code face to face to add WeChat friends

Reference answer: D

2. The network disk is a very convenient electronic data storage and circulation tool , Which of the following statements is incorrect?

A. Important information such as personal password, ID card photo, etc. are not stored in the cloud disk

B. Reasonably set the login password for the cloud disk and bind the mobile phone

C. I am the master of my territory and can store and share it. Violated pirated digital video file

D . Use the sharing function carefully and cancel expired sharing in time

Reference answer: C

3. We often download files and software from the website. In order to ensure the system security, which of the following processing is done. The most correct measures:

A. Open directly or use

B. Check and kill first Virus, then use

C. Get used to downloading and automatically installing

D. After downloading, do an operating system backup first. If there is any abnormality, restore the system

Reference answer: B

4. In our daily life, we need to regularly modify all kinds of computers, emails, and websites The password is because of ______.

A. Follow the national security laws

B. Reduce the chance of computer damage

C. Ensure that the password will not be forgotten

D. Ensure that personal data And privacy security

Reference answer: D

5. When surfing the Internet in a public place, the following ______ behavior is safe .

A. Consult the administrator how to safely download games or movies

B. Do not log in to your personal online banking or email account

C. Use the library computer to help others query book information

0 D. The above are all

Reference answer: D

6. What are the methods of safe when shopping online ?

A. Do not use public computer

B. You must carefully check the login URL, do not click unknown links easily, and carefully click on the payment link sent by the merchant

C. Do not receive and install unknown links. Software, beware of phishing websites, and prevent economic losses caused by personal information leakage

D. The above are all

Reference answers: D

7. Xiao Zhang found that the security software reminds his computer that there are system vulnerabilities. What is the most appropriate way to do it?

A. Update the patch immediately to fix the vulnerability

B. Ignore it and continue to use the computer

C. Put it aside for the time being, and remind you to fix the vulnerability

C in one day. ml0D. Restart the computer

Reference answer: A

8. A friend's QQ suddenly sent a website link to ask for a vote. The most reasonable way is:

A. Because it is its friend's information, open the link to vote directly

B. It may be that a friend's QQ was stolen, and the malicious link was sent. First, confirm with your friend through your mobile phone that there is no abnormality, and then consider whether to vote at your discretion.

C. Do not participate in any voting

D. Add friends to the blacklist

Reference answer: B

Reference answer: B

9. Ms. Wu found that someone maliciously spread rumors and slandered herself on WeChat Moments, and it has attracted the attention of many people and has caused serious impact on herself. She should immediately:

A. Report the case to the public security organs, save relevant evidence, and explain the facts to others in a timely manner

B. Find a "post-deletion company" to deal with

C. Retaliate against the other party on WeChat, You can't help

D. Contact the WeChat operating unit and cancel the other party WeChat account

Reference answer: A

0. When the user leaves temporarily, he can hold down ______ at the same time to lock the Windows system to prevent him from being illegally logged in by others. Computer.

A.WIN key and Z key

B.F1 key and L key

C.WIN key and L key

D.F1 key and Z key

Reference answer: C

, Activity time : September 11, 2022 9:00-2022 September 11, 2018:00;

. Each WeChat ID can only participate in the lottery once;

. Those who participate in the answering questions will answer 3 questions randomly, and answer more than 2 questions correctly participants can participate in the lottery.

st stage: 9:00-11:00

st stage: 12:00-14:00

st stage: 16:00-18:00

technology Category Latest News