"Don't realize that risks are the biggest risk. As the saying goes, "Suffering comes from neglect, disasters come from subtleties."
html From September 5th to 11th, 2022 National Cyber Security Promotion Week will be unified nationwide : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Carry out. Holding a cybersecurity publicity week and improving the public's awareness and skills of cybersecurity are important contents of national cybersecurity work. General Secretary Xi Jinping has repeatedly emphasized the importance of network security awareness and put forward specific requirements for strengthening network security awareness.
Come and learn with Sister Ning, General Secretary Xi Jinping’s important statement on network security~
0
For this network security manual, please check
Together to improve network security awareness
Build a network security line together
html ml20
Network security publicity During the week of transmission,
Campus Day, Telecom Day, Rule of Law
Financial Day, Youth Day, Personal Information Protection Day
Six major theme days, draw all the network knowledge in one place
"Personal Information Protection Day" event
will be held online on the same day (September 11)
Question bank Here
Let’s take notes together!
A. Name, date of birth, ID number, biometric information
B. Address, phone number, email
C. Health information, whereabouts information
C. 0D. The above are allReference answer: D
A. Correct
B. Error
Reference answer: A
A. I am
B. I am
C. The person collected
D. National competent department
Reference answer: C
A.Personal rights
B.Health rights
C.Privacy rights
D.Reputation rights
D.Reputation rightsReference answer: C
A. Correct
B. Error
Reference answer: A
A.Health information
B.Personal information
C.Medical information
D. Whereabouts information
Reference answer: B
A. Civil tort liability
B. Administrative penalties
C. Criminal liability
D. All of the above may be
Reference answer: D
8. Xue Moumou used the website to make a mask appointment to induce others to fill in the name, ID number, Mobile phone number and other information will be posted to the public through your WeChat Moments. Xue Moumou's behavior constitutes ______.
A. Crime of infringing on citizens' personal rights
B. Infringing on citizens' democratic sovereignty
C. Crime of infringing on citizens' personal information
Reference answer: C
9. During the epidemic prevention and control period, institutions that collect or grasp personal information must be responsible for the _____ of personal information and adopt strict management and technical protection measures to prevent theft and leakage.
A. Real and valid
B. Security protection
C. Real-time update
Reference answer: B
A. Often harassing calls to others at night to infringe on the peace of others' private life.
B. Install a camera on the neighbor's window to peek at the neighbor's daily life.
C. Publish information about others suffering from infectious diseases on the Internet.
D. All of the above are
Reference answer: D
A.Delete
B.Correct
C.Protect
D.Revoke
Reference answer: A
A.Trojan
B.Word
C.Virus
Registration Test answer: A
A. Ransomware
B. Virus
Reference answer: A
A. The plot is mild
B. It does not have much impact
C. The plot is severe
D. No fault
Reference answer: C
A. Buy it quickly, and if you are late, you won’t be able to buy
B. Try it for a few months first, and if you do get the money, then add additional investment in
C. Beware of " Ponzi fraud Bureau ”, avoid economic losses
D. Convince relatives and friends Friends invest together
Reference answer: C
A. Obtain system permissions to install a better system
B. Set the lock screen password and use biometric secondary authentication
C. Check regularly Kill viruses, clean up junk files
D. Set application permissions, reject some unnecessary permissions application
Answer: A
A. Follow the link provided by the prompt to download the antivirus software and antivirus
B as soon as possible. Confirm whether the prompt is popped up by the installed antivirus software to avoid encountering fake antivirus software. Scam
C. Don't click on the pop-up link
D easily. Try to close the current browser tag and observe whether the prompt disappears
Reference answer: A
A. Individuals can publish information on dangerous goods on the Internet
B. Any unit or individual is prohibited from publishing information on dangerous goods manufacturing methods on the Internet
C. Dangerous goods production units can publish information on the Internet Information on the method of manufacturing hazardous goods
Reference answer: B
A. Online MLM
B. Phishing
C. Network Attack
D. Network fraud
Reference answer: A
A. Data encryption
B. Identity authentication
C. Data integrity
D. Access control
A. Bitcoin payment is me The legal digital currency payment method of the country
B. Use Blockchain technology can ensure that digital currency is absolutely safe
C. After the Bitcoin account is lost, you can apply for a password to the bank to retrieve
D. Digital currency still has network security risks
Reference answer: D
A. The machine that initiates active attack
B. The machine that is implanted by a hacker in a Trojan. The hacker controls the broiler to participate in the attack
C through the Trojan control end. Users usually voluntarily become broiler
D. Broiler cannot launch an attack
Reference answer: B
A. Username/password authentication
B. Fingerprint authentication
C.CA authentication
D. Dynamic password authentication
Reference answer: A
A. Important network products and services
B. All terminal equipment
C. Laptop , desktop computers, etc.
D. Remote test
Reference answer: A
A.Creator
B.Manager
C.Member
D.Above are all
A. Infringement of copyright
B. Infringement of trademark rights
C. Infringement of patent rights
D. Does not constitute infringement of rights
Reference answer: A
A. Netizens must have ill-thinking plans, and call the police immediately
B. There are many traps on the Internet, ignore
C. Only tell netizens their own bank account
D. Only provide a copy of your ID card
Reference answer: B
A.Phone website
B.Hangma website
C.Game website
D.Portrait website
D.Portrait websiteReference answer: B
A. U disk is damaged
B. Infected with virus
C. Disk fragmentation caused by
D. There are junk files on the USB disk that have not been completely cleaned
Reference answer: B
A. Carefully choose the job search website and verify that the email address to confirm that the resume is the company's real email address
B. In order to increase the authenticity of the resume, job seekers should fill in their specific information in detail, such as home address, ID number, etc.
C. Do not details on your resume Fill in your specific information, such as home address, ID number, etc.
Reference answer: B
A. Be careful when posting photos in WeChat Moments, and do not post photos containing personal information
B. Share photos by setting up groups
C. Turn off the "People Nearby" function in WeChat to avoid accidentally leaking personal information and being used by criminals to commit fraud
D. The above are all
parameters Test answer: D
A. In order to improve the winning rate or selection rate, you should fill in the detailed contact information and home address and other personal information
B. Do not disclose the specific details Personal information
C. Fill in the real personal information of good friends
Reference answer: B
A. In the Internet age, the protection of privacy rights has been greatly impacted
B. Although the Internet world is different from the real world , but it also needs to protect personal privacy
C. Since the network is a virtual world, there is no need to protect personal privacy on the Internet
D. You can use the law to protect network privacy rights
reference Answer: C
A. I'm sorry to say anything, I believe that the other party is a friendly and upright
B. I kindly remind the other party to avoid it, or use my body to block
C . Fiercely signaled the other party to walk away and immediately reported the security department that this person is suspicious
D. Illegally fake input of some characters on the keyboard to prevent being peeked
Reference answer: B
A. Use your birthday date as password
B. Set the long password
C. Choose irregular combination of numbers, letters and symbols
D .Replace
Reference answer: A
A. Install and run the regular antivirus software
B. Do not click or open emails and links of unknown origin
C. Use to move the storage medium Antivirus
D. Lend the computer to others at will to use
Reference answer: D
A. Install antivirus, intrusion and other security protection software
B. Set up the computer login password at will and use
C for a long time. Important data encryption memory and regularly backup
D. Lock the personal computer when leaving
Reference answer: B
A. You cannot open
B before installing antivirus software. It is likely to contain malware, and you can delete the email directly and completely. tml0C. Forward to friends and request friends Help antivirus
Reference answer: C
A. The camera is broken
B. The computer is broken
C. It should have been lighted up
D. Maybe he was hit by a Trojan and was being peeped by a hacker
Reference answer: D
A. Don’t be afraid of any virus attacking
B. Don’t be afraid of any phishing attack
C. Don’t be afraid of any bad information
D. Only by cooperating with good Internet access behavior can the computer be effectively protected
Reference answer: D
A. Scan the coupon QR code for mobile phone
B. Connect to free WiFi
C. Open the mobile WiFi automatic connection function
D. Scan the other party’s QR code face to face to add WeChat friends
Reference answer: D
A. Important information such as personal password, ID card photo, etc. are not stored in the cloud disk
B. Reasonably set the login password for the cloud disk and bind the mobile phone
C. I am the master of my territory and can store and share it. Violated pirated digital video file
D . Use the sharing function carefully and cancel expired sharing in time
Reference answer: C
A. Open directly or use
B. Check and kill first Virus, then use
C. Get used to downloading and automatically installing
D. After downloading, do an operating system backup first. If there is any abnormality, restore the system
Reference answer: B
A. Follow the national security laws
B. Reduce the chance of computer damage
C. Ensure that the password will not be forgotten
D. Ensure that personal data And privacy security
Reference answer: D
A. Consult the administrator how to safely download games or movies
B. Do not log in to your personal online banking or email account
C. Use the library computer to help others query book information
0 D. The above are all
Reference answer: D
A. Do not use public computer
B. You must carefully check the login URL, do not click unknown links easily, and carefully click on the payment link sent by the merchant
C. Do not receive and install unknown links. Software, beware of phishing websites, and prevent economic losses caused by personal information leakage
D. The above are all
Reference answers: D
A. Update the patch immediately to fix the vulnerability
B. Ignore it and continue to use the computer
C. Put it aside for the time being, and remind you to fix the vulnerability
C in one day. ml0D. Restart the computerReference answer: A
A. Because it is its friend's information, open the link to vote directly
B. It may be that a friend's QQ was stolen, and the malicious link was sent. First, confirm with your friend through your mobile phone that there is no abnormality, and then consider whether to vote at your discretion.
C. Do not participate in any voting
D. Add friends to the blacklist
Reference answer: B
Reference answer: B
A. Report the case to the public security organs, save relevant evidence, and explain the facts to others in a timely manner
B. Find a "post-deletion company" to deal with
C. Retaliate against the other party on WeChat, You can't help
D. Contact the WeChat operating unit and cancel the other party WeChat account
Reference answer: A
A.WIN key and Z key
B.F1 key and L key
C.WIN key and L key
D.F1 key and Z key
Reference answer: C
st stage: 9:00-11:00
st stage: 12:00-14:00
st stage: 16:00-18:00