版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
计算机网络安全员培训考试题库(答案)原版(Computernetwork
securitystafftrainingexaminationquestionsdatabase
(answer)original)Computernetworksecuritystafftrainingexaminationquestionsdatabase(answer)originalTrainingcourseexercises(1)Chapter1Introductionsecurityregulations,securitytechnologyandsecuritymanagementarethreemajorcomponentsofcomputerinformationsystemsecurityprotection.Answer:Ydifficulty:Athebasiccomponentsofacomputerinformationsystemare:computerentities,information,and().networkmediapeopleciphertextAnswer:Cdifficulty:Csecurity,informationsecurity,operationsecurityandpersonnelsecurity.Answer:Ydifficulty:Bfromthepointofviewofsystemengineering,computerinformationnetworkisrequired.availability,integrity,confidentialityauthenticity(nonrepudiation)reliabilityandcontrollabilitystabilityAnswer:ABCdifficulty:B5.thesecuritythreatsofcomputerinformationsystemcomefromtwoaspectsinsideandoutside.Answer:Ydifficulty:A,thevulnerabilityofcomputerinformationnetworkleadstothevulnerabilityandsecurityofinformationsociety.Answer:Ydifficulty:Ameasuresfortheimplementationofcomputerinformationsystemsecurityprotectioninclude:().A.safetyregulationssafetymanagementsecuritytechnologysafetytrainingAnswer:ABCdifficulty:B8.,thenationalpublicinformationnetworksecuritysupervisionworkisanimportantpartofpublicsecuritywork.Answer:Ydifficulty:A9.,inordertoprotectinformationsecurity,inadditiontotheinformationsecurityprotection,weshouldalsopayattentiontoimprovethesystemintrusiondetectionAbility,systemeventresponsecapability,andrapidrecoverycapabilityifthesystemiscompromisedbyintrusions.Answer:Ydifficulty:C10.OSILayerSecuritytechniquestoconsidersecuritymodels0.physicallayerdatalinklayernetworklayer,transportlayer,sessionlayerpresentationlayer,applicationlayerAnswer:ABCDdifficulty:C11.datalinklayercanbeusedAndencryption,becausedifferent1inklayerprotocolshavedifferentframeformats,sowhenencrypting,differentlinklayerprotocolsmustbedistinguished.routingintrusiondetectiondigitalsignatureaccesscontrolAnswer:Bdifficulty:Cthesecuritymechanismsadoptedinthenetworkareasfollows:().zoneprotectionencryptionandconcealmentmechanisms;authenticationandidentityauthenticationmechanisms;auditing;integrityprotectionpowercontrolandaccesscontrol;businessfill;routingcontrolnotarizationmechanism;redundancyandbackupAnswer:BCDdifficulty:D13.publickeyinfrastructure(PK1)consistsofthefollowingcomponents:().CertificationCenter;RegistrationCenterqualityinspectioncenterconsultingservicecertificateholder;user;certificateLibraryAnswer:ADdifficulty:C.,whenthepublicsecurityorgansexerciseadministrativesupervisionofcomputerinformationsystemsinothercountries,thelegalstatusofbothsidesisequal.Answer:Ndifficulty:B.,thepeople'spoliceexercisethecomputerinformationsystemsafetysupervisionrightisrepresentativeofthecountry,soitisthemainbodyoftheadministration.mandatorytechnicalstandards,isrecognizedbythestatelawsandregulations,therelativevoluntarycomplianceandimplementationoftechnicalstandards.Answer:Ndifficulty:B,thekeypointofourcomputerinformationsystemsecurityismaintenanceAndotherimportantareasofcomputerinformationsystemsecurity.nationalaffairseconomicconstructionandnationaldefenseconstructionadvancedscienceandtechnologyEducationCultureAnswer.ABCdifficulty:Baslongasthecomputerinformationsysteminourcountryanditssecurityprotectionareapplicable,theregulationsonthesafetyprotectionofcomputerinformationsystemsshallapply.Answer:Ndifficulty:AThefourthchapter,computerinformationsystemsecurityprotectionsystemNineteenThesecuritylevelistheconfirmationofthecomputerinformationsystembythenationalinformationsecuritysupervisionandadministrationdepartment.scaleimportancesecuritycapabilitynetworkstructureAnswer:Cdifficulty:BThe20.securitylevelisareflectionoftheimportanceandsensitivityofthecomputerinformationsystem.applicationareausessystemhardwaretakesafetymeasuresprocessinginformation,thepublicsecurityorgansintheInternetcafebeforetheofficialbusiness,donotneedtoconductsecurityauditsofInternetcafes.Answer:Ndifficulty:AInternetusersmustusevalidIDtousetheinternet.Answer:Ydifficulty:AInternetcafescanbeleasedtootheroperators.Answer:Ndifficulty:AInternetcafesownersandsecuritymanagementpersonneltocarryoutsafetyknowledgetraining.Answer:Ydifficulty:A26.computerinformationsystemusingunits()securitymanagementsystem.doesnotalwayshavetobebuiltcanbeestablishedshouldbeestablishedvoluntaryestablishmentresponsibleforcomputerinformationsystemsecurityspecialproductsaleslicenseapprovalandissuedthe"computerinformationsystemsecurityspecialproductsalespermit"is().NationalBureauofTechnicalSupervisionMinistryofinformationindustryPublicSecurityNetworkSupervisionBureauofMinistryofpublicsecurityDepartmentofnationalsecurityAnswer:Cdifficulty:A28.thePublicInformationNetworkSecuritySupervisionBureauoftheMinistryofpublicsecurityisresponsibleforthesaleslicenseofcomputerinformationsystemsecurityspecialproducts)work.managementapprovalandcertificationC.approvalD.ProductionsAnswer:Bdifficulty:Aacomputervirusisasetofcomputerinstructionsorprogramcodethatisprogrammedorinsertedintoacomputerprogramtodestroycomputerfunctionordestroydataandaffecttheuseofacomputer.Answer:Ndifficulty:Bacomputervirusisasetofcomputerinstructionsorprogramcodethatcan().destroyscomputerfunctiondestroyscomputerdataselfreplicationharmsthehealthofcomputeroperatorsAnswer:ABCdifficulty:C,violationsofstatelawsandregulations,endangeringthesafetyofcomputerinformationsystems,knownascomputercases.In32.,theconstructionofcomputerinformationsystemintheoperationmanagement,theimportantsafetytechnologyandsafetystandardsimplementation,systemconstructionandimplementationmeasures,preventmajorsecurity,foundillegal,accidents,andothersafetymanagementinamajorsecurityrelatedbehavior,safeevent.Answer:Ydifficulty:A33.computercasesdividedintocriminalcasesandadministrativecases,whichviolatethecriminallawofthecomputercaseiscomputercriminalcases,inviolationofadministrativeregulationsofcomputersecuritycomputeradministrativecases.Answer:Ydifficulty:AThefifthchapter,computerinformationnetworksecurityprotectionanddetectiontechnologyThe34.TCP/IPprotocolis(),andthedataisusuallyonthenetwork,anditiseasyto.publicreleaseeavesdroppinganddeceptionencryptedtransportplaincodetransferAnswer:ADBdifficulty:Cnetworkattacksgenerallyhavethreestages:().getsinformationandspreadswidelyaccesstotheinitialaccess,andthentrytogettheprivilegeofthetargetleavesthebackdoor,attacksothersystemtargets,andevenattackstheentirenetworkcollectsinformationandlooksforgoalsAnswer:DBCdifficulty:Cthecontentofintrusiondetectionmainlyincludes:().exclusiveresources,malicioususeattemptstobreakinorsuccessfullybreakinandimpersonateotheruserssecurityauditbreachessecuritypolicies,legitimateusers'leaksAnswer:BDAdifficulty:Cusingahumanintrusiondetectionsystem(IDS)todetecttime,Thefirstproblemisdecidingwheretoinstall,detect,andanalyzeintrusiondetectionsensors(Sensor)ortestengines(Engine).Answer:Ydifficulty:C,forintrusiondetectionsystems(IDS),itwouldbepointlesstodetectonlyhackerintrusionsifnot.responsemeasuresresponsemeasuresormeasurespreventionpolicyresponsedeviceAnswer:Bdifficulty:Ccomputercrimestatisticsshowthatcomputersecurityproblemsstemmainlyfrom().hackerattackscomputervirusattackssysteminternalAnswer:Cdifficulty:CThesixthchapter,theentitysecurityprotectiontechnologyandthecomputerroomtestcomputerroomisthekeyplacetoinstallthemainbodyofcomputerinformationsystem,anditisthefocalpointofwork,soweshouldstrengthenthesafetymanagementofcomputerroom.entitysecurityprotectionpersonnelmanagementmediasecurityprotectiondevicesecurityprotectionAnswer:Adifficulty:Bthecomputerroomshallconformtothenationalstandardsandtherelevantstateregulations.Constructioninthevicinityofthecomputerroomshallnotendangerthesafetyofthecomputerinformationsystem.Answer:Ydifficulty:Ainchargeofthesecurityofcomputerinformationsystemofpublicsecurityorgansandurbanconstructionandplanningdepartmentsshouldbecoordinatedwiththeconstructionunit,inthepremiseofnotharmtheinterestsofusers,formulatemeasures,reasonableconstruction,goodsafetyprotectionofcomputerinformationsystem.Answer:Ndifficulty:Aentitysecuritytechnologiesinclude:().environmentalsecuritydevicesecuritypersonnelsafetymediasecurityAnswer:ABDdifficulty:B44.,regionalsecurityshouldbeconsideredfirst(c)usedtoidentifyandaccesstheidentityoftheuserandverifyitslegality,mainlythroughspecialidentifiers,passwords,fingerprintsandsoon.visitors,holdingsphysicalaccesscontrolvisitorshavecharacteristicsvisitor,sinformationAnswer:Bdifficulty:Cantistaticmeasuresareuseofanti-staticfloor;staffarerequiredtowearanti-staticclothingandshoesintotheroomindoorrelativetemperaturerangeisasfollows:45%,65%;computerandfloorareeffectivelygroundedinstallshieldingmaterialofficeroom,officeequipmentorauxiliaryequipmentmaterialsshouldbeproducedasfaraspossibleusinglessstaticmaterialAnswer:ABDdifficulty:Acomputersystemgroundingincludes:DCground;ACworkplace;safetyprotectionground;powersupplyzerolineandlightningprotectionsite.Answer:Ndifficulty:B,theuseofshieldingroom,first,inordertoisolatetheexternalandinternalequipment,mutualelectricfield,magneticfield,electromagneticinterference,andtwoistopreventinterferencefromtheelectromagneticradiationgeneratedbythesourcetotheexternalspace.classamedia:thecontentofthemediaisthemostimportanttothe()function,cannotbereplaced,andcannotberestoredimmediatelyafterthedamage.securityoperationsystemdeviceAnswer:CDdifficulty:Btransportation,carryingormailingofcomputerinformationmediashallbesubmittedtothestateastrue(or).customsbusinesstaxfrontierdefenseAnswer:Adifficulty:Athecomputersiteistheplacewherethecomputerinformationnetworkisinstalledandoperated.Itisalsotheplacewheretheinterfaceoftheman-machinesystemisformed,andisthephysicalplacefor"human-computerinteraction”.It
isanimportantpartofourimplementation.Thepracticalinspectionofthecomputersiteisanimportantmeanstoensurethesecurityoftheinformationnetwork.A.computerinformationnetworksecurityoperationB.computerinformationnetworksecuritysupervisionB.computerinformationnetworksecuritysupervisionC.D.computerinformationnetworksecurityprotectioncomputerinformationnetworksecuritytestC.D.Answer:Bdifficulty:Bcomputersitesafetytesting,including:().temperature,humidity,dustillumination,noise,electromagneticinterference,environmentalfieldintensitygroundresistance,voltage,frequencywaveformdistortionrateanalysismethodforcorrosivegasesAnswer:ABCDdifficulty:AtheequipmentoftheinformationsystemcanpassbyatworkAndsoonradiation,produceelectromagneticleakage.Theelectromagneticsignalisreceivedasdown,afterextraction,itcanrestoretheoriginalinformation,resultingininformationsecurity.groundwiresignallineparasiticelectromagneticsignalsorharmonicsantennaAnswer.*ABCdifficulty:CTEMPESTtechnologyhasthreemainprotectionmeasures:firstistosuppress;secondistoshield;thirdistosendinterferencesignals.Atthesametime,thesystemworkswithpseudonoisetoconcealtheworkingfrequencyandinformationcharacteristicsofthesystem,sothattheinformationcontentcannotbedetectedbytheoutsideworld.Answer:Ydifficulty:Cencryptiontransmissionisaveryeffectiveandfrequentlyusedmethod,anditcansolvetheelectromagneticinformationleakageproblemoftheinputandoutputterminals.Answer:Ndifficulty:BThe55.EMCstandardisdesignedtoensure(normal)work.A.networkmediainformationsystemsandequipmentAnswer:Ddifficulty:C56)referstoallmagneticsignalsthatarenotassociatedwiththeusefulsignal,undesired,oradverselyaffectedbyelectricalandelectronicequipment.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Cdifficulty:C57(E)referstotheelectromagneticnatureofanelectronicsystemordevicethatdoesnotaffecteachotherinanelectromagneticenvironmentthatisnormallyoperating.electromagneticcompatibilityconductioninterferenceelectromagneticinterferenceradiationinterferenceAnswer:Adifficulty:BEMCtestsandcontrolstheelectromagneticemissionofinformationsignalsthatuserscareabout.TheTEMPESTonlytestsandconstrainsallelectromagneticemissionsofthesystemandequipment.Answer:Ndifficulty:Credsignalsarethoseoncestolen,thesignalwillcausetheuserinformationconfidential.Othersignalsarecalled“blacksignals.Answer:Ydifficulty:C,redzone:redsignaltransmissionchannelorunitcircuitcalledredzone,andviceversaisblackarea.Answer:Ydifficulty:Cradiationinterference:interferenceexistsintheformofvoltageandcurrent,andthroughthecircuit,theinterferenceiscoupledtothedevice.ConductiontrunkInterference:thepresenceofradiation,electricfield,andmagneticfieldcoupledtotheequipmentorsystembyelectromagneticfieldemission.Answer:Ndifficulty:C,thebasicprotectionofthreemethods:first,tosuppresselectromagneticemissions,takevariousmeasurestoreducethe“redzone"circuitelectromagneticemission.Thetwoisshieldingisolation,arounditusingavarietyofshieldingmaterialstomakeitattenuatedredsignalsignal,electromagneticlaunchfieldissmallenoughtomakeitdifficulttoreceive,andevencannotreceive.Thethreeisrelatedinterference(containment),takevariousmeasurestomakeinformationrelatedtoelectromagneticemissionleakageisreceivedandcannotidentify.Answer:Ydifficulty:Ccommonlyusedmethodsofelectromagneticinformationleakageareasfollows:().informationencryptioncorrelationinterferencemethodsuppressionmethod”screen"law,thatis,theairspacelawAnswer:DCBAdifficulty:Cthemostimportantsourcesofelectromagneticinterferenceare:().powercycleinterferencelightningelectromagneticpulseLEMPgridoperatingovervoltageSEMPelectrostaticdischargeESDAnswer:BCDdifficulty:Cmentionedlightningprotection,itiseasytothinkofthelightningrod.Infact,weusuallyseethelightningrodisusedtoprotectthehousefromlightningstrike,thatis,againstdirectlightning.Thecomputerinformationsystemoftheelectronicequipmentoflightningproducedbyinductionlightningprotection,sothemethodiscompletelydifferent.Answer:Ydifficulty:B,themainwaysofthunderintrusionintocomputerinformationsystemare:().InformationtransmissionchannellineintrusionpowersupplylineintrusionbuildinggroundpotentialcounterattackAnswer:BADdifficulty:Ctopreventthecomputerinformationsystembylightning,cannotexpect(),whichnotonlyprotectthecomputersystem,butincreasedthecomputersystemoflightning.isbuiltinopenspaceslightningrodbuildingheightreducescomputersystemmountingfloorsAnswer:Bdifficulty:Clightningprotectionmeasuresinallisconnectedwiththecomputerontheoutside(includingpowerlineandcommunicationlines)withspeciallightningprotectionequipment-lightningprotector,andstandardwire,topreventthegenerationofhighpotentialingroundlightningcounterattack.Answer:Ydifficulty:Blightningprotectiondeviceisdividedinto:().A.operationlightningprotectiondeviceLightningprotectiondeviceforB.communicationinterfaceC.buildinglightningprotectiondeviceLightningprotectiondeviceforD.powersupplyAnswer:BDdifficulty:Ccomputerinformationsystemprotection,simplysummarizedare:voltagesharing,shunt,shieldingandgoodgrounding.Therefore,lightningprotectiondevicesmustbereasonable).shieldconfigurationgroundconfigurationshuntconfigurationpressuresharingconfigurationAnswer:Bdifficulty:Ccomputerinformationsystemsecurityprotectionlightningovervoltageandovercurrentmustadoptadvancedtechnology,reasonableeconomy,safetyandpracticality,theabovenationalcertificationministerialspecializinginlightningprotectionequipmenttestinglaboratorytesting,andthe()withexcellentproducttypestandardGA173-1998,zcomputerinformationsystem*intheconfirmationofthelightningprotector.NationalSecurityAgencynationalqualityinspectiondepartmentadministrationofindustryandCommercepublicinformationnetworksecuritysupervisiondepartmentAnswer:Ddifficulty:Binstallationofthecomputerinformationsystemofqualified1ightningprotector,mustalsobein()beforethunderstormseasonoflightningprotector:protectiveearthingdeviceforanannualinspection,foundunqualified,shouldbetimelyrepairorreplacement.thirdyearssecondyearsannuallyD.thenAnswer:Cdifficulty:BTheseventhchapter,riskanalysistechnologyandaudittracking73.()istoconsiderthepossibleharmtotheinformationsystemcausedbyman-madeornaturalthreatfactorsandthepossiblermationsecurityanalysisoperationsafetyanalysisriskanalysissecuritymanagementanalysisAnswer:Cdifficulty:Btheriskmanagementprocesshasthreebasicelements:().A.'splanfortheaccidentChoiceofB.safetymeasuresconfirmationandidentificationeconomicriskestimation75.,thebenefitsofriskanalysisare:().helpstostrengthenscientificdecision-makingandpreventionmeasuresforsafetymanagementhelpstomakereasonableuseofthefundshelpsimprovesafetyisconducivetosafetyengineeringplanningAnswer:CABDdifficulty:Briskanalysisstepbystepis:().assetinventory;understandingthesourcesofthreatsandtheirimpactonassetvulnerability;estimatingthelikelihoodofathreatreviewsecuritypolicycalculatestheannualexpectedloss;investigatesfeasiblesafetymeasuresandtheircostoverheadcalculatesannualrevenuefromsecuritymeasures;developssecurityplansAnswer:ACDdifficulty:C,theparticipationofthesecurityplancannotbemadebyallpersonneloftheunit,buttheimplementationofthesafetyplanrequiresfullparticipation.Thisneedstocarryonthesafetyeducationtotheunit(),enhancestheirsecurityconsciousness.securitypersonnelleadingcadreallstaffmanagersAnswer:Cdifficulty:Aaudittrackingisthepreestimationofthethreatofsecurityfactorsandtheeffectivenessofpreventivemeasurestaken,andriskanalysisasameansoftrackingaftertheeventtomaintainthesafetyofthesystem.Answer:Ndifficulty:ASeventy-nineInformationsecurityauditsystemhasthefollowingfiveimportantsecurityobjectives:(1)theauditreviewofindividualobjectaccess,personalaccesstodetailedhistory,supportavarietyofprotectionmechanismofeffectiveness;(2)foundillegaluseandattempttobypassprotectionmechanism,trytorepeatthefailure;(3)finduseroperationbeyondtheirownauthority;(4)toattempttobypasssystemofprotectionmechanismofoffendersconstitutetechnicalbarriersandlegaldeterrence;(5)recordsandfoundwaystoprovideattempttobypassprotectionmechanismforusers.Answer:Ydifficulty:A80.audittrackingtechnologycansetupa"worklog"fortheoperationoftheinformationsystem.Iftheaudittrackingfunctionisstarted,theworklogcanbechanged.Itismaintainedbythesystemandmanagedbyalllevelsofsecuritymanagementatthediscretionofthepeople.Answer:Ndifficulty:BTherelationshipbetweenthe81.auditandcomputercrimeare:theestablishmentofaudittracking,topreventcomputercrime;theaudittrail,exposepossiblecomputercrime;accordingtotheaudittracking,investigationofcomputercrime;onthebasisofaudittracking,computercrimes.Answer:Ydifficulty:ATheeighthchapterisaboutthelegalresponsibilityofcomputerinformationsystemsecurityprotection.82,thelegalliabilitythattheadministrativecounterpartviolatesthecomputerinformationsystemsecurityprotectionlawmayinclude:().A.civilliabilityadministrativeresponsibilitystatecompensationliabilityAnswer:ABCdifficulty:Acomputercrimeisthebehaviorofthecomputerasatoolortocomputerassetsastheobjectofcrime,accordingtoChina,scriminallawshouldbepunished,withsocialharmbehavior.Answer:Ydifficulty:Astatecompensationcanbedividedinto().militarycompensationcriminalcompensationadministrativecompensationjudicialcompensationAnswer:BCdifficulty:Btheorganofdutyforadministrativecompensationis().administrativeorgansfortheimplementationofviolationsimplementstheinfringingpersonnelofindividualpersonnelimplementstheadministrativeorgansinwhichtheinfringingpersonnelbelongpeople,sgovernmentsatorabovethecountylevelAnswer:ACdifficulty:B,administrativecompensationreferstotheillegalexerciseoffunctionsandpowersbytheadministrativeorgansandtheirstaff,infringinguponthelegitimaterightsandinterestsoftheadministrativecounterpartandcausingdamage,andthecompensationorganshallundertakedamagesaccordingtolaw.Answer:Ydifficulty:ATrainingcourseexercises(two)1.People'sRepublicofChina'sfreedomofcommunicationandcommunicationsecretsareprotectedbylaw.Answer:Ydifficulty:A2.,inviolationofstateregulations,theinvasionofstateaffairs,nationaldefenseconstruction,cutting-edgescienceandtechnologyinthefieldofcomputerinformationsystemsshouldbelocated).fixed-termimprisonmentofnotlessthanfiveyearsdetentionfixed-termimprisonmentofnotlessthanthreeyearsdetentionAnswer:CDdifficulty:Binviolationoftheprovisionsofthestate,inthecomputerinformationsystemstorage,processingortransmissionofdataandapplicationstodelete,modify,increasetheoperation,theconsequencesareserious).trespassoncomputerinformationsystemcrimedamagecomputerinformationsystemcrimeoffenceofdisruptingtheorderofradiocommunicationmanagementremoves,modifies,andaddscomputerinformation,systemdata,andApplicationsAnswer:Bdifficulty:C4.intentionallymakinganddisseminatingcomputervirusesandotherdestructiveproceduresthataffectthenormaloperationofthecomputersystemshallbesentencedtofixed-termimprisonmentofnotmorethanfiveyearsorcriminaldetentioninaccordancewiththelaw.theconsequencesareseriouscausesharmcausesthesystemtogowronginformationmissingAnswer:Adifficulty:Bthesupervisionandmanagementofcomputerinformationsystemsecurityworkshouldbecompleted.MinistryofinformationindustrypublicsecurityorgansProcuratorateStateDepartmentAnswer:Bdifficulty:BRegulationsofthePeople'sRepublicofChinaonPunishmentsinPublicOrderandSecurityAdministration(),inaccordancewiththeprovisionsofthecriminallawofthePeople*sRepublicofChina,constituteacrime,shallbeinvestigatedforcriminalresponsibilityaccordingtolaw;notyetcriminalpunishment,Thosewhoshouldbepunishedbypublicsecurityadministrationshallbepunishedinaccordancewiththeseregulations.disturbssocialorderimpairingpublicsafetyinfringementofcivilrightsviolationsofpublicandprivatepropertyAnswer:ABCDdifficulty:Bpenaltiesforviolationsofpublicsecurityadministrationaredividedintothefollowingthreecategories:().warningfinereeducationthroughlabourdetentionAnswer:ABDdifficulty:Corgans,groups,enterprisesorinstitutionsviolatingtheadministrationofpublicsecurityshallpunishthosewhoaredirectlyresponsible,andthosewhoareinchargeoftheunitsshall,atthesametime,punishtheofficersincharge.Answer:Ydifficulty:AthedecisionoftheStandingCommitteeoftheNationalPeople*sCongressonsafeguardingInternetsecuritywasadoptedatthe(or)secondmeetingoftheStandingCommitteeoftheNationalPeople*sCongressofthepeople*sCongressonDecember28,2000.eight,eighteennine,nineteenten,twentyeleven,twenty-oneAnswer:Bdifficulty:A10,themainpurposeofthedecisionoftheStandingCommitteeoftheNationalPeople,sCongressonsafeguardingInternetsecurityis().InordertopromoteA.promotesthehealthydevelopmentofInternetinChinasafeguardnationalsecurityandsocialpublicinterestsprotectsthelegitimaterightsandinterestsofindividuals,legalpersonsandotherorganizationsAnswer:ABCDdifficulty:B,inordertoensurethesafetyofInternetoperation,ifoneofthefollowingactsconstitutesacrime,heshallbeinvestigatedforcriminalresponsibilityinaccordancewiththerelevantprovisionsofthecriminallaw:).computerinformationsystemsthatinvadenationalaffairs,nationaldefense,andcutting-edgescienceandtechnologyintentionallyproducesandspreadscomputervirusesandotherdestructiveprograms,attackscomputer
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 理发店员工劳务合同范本
- 2024年商品房销售与售后服务合同3篇
- 配送服务合同
- 网络游戏开发与运营合同(04版)
- 物理化学期中复习 第七章
- 膜结构工程2024年度项目评估合同
- 基于二零二四年度的智能交通系统设计与实施合同2篇
- 意向施工协议完整版
- 屋顶租赁合同范本范本
- 总经理聘用合同
- 2024年物流运营与成本控制培训资料
- 富马酸奥赛利定注射液-药品临床应用解读
- 劳务派遣劳务外包服务方案(技术方案)
- 建筑工程竣工验收消防查验文件-消防施工质量专项检查表(主体阶段)-消防施工质量专项检查表装饰装修阶
- 煤气发生炉拆除方案
- 苏教版数学五年级上册全册教学反思(版本1)
- 广东盈科材料有限公司年产64吨高端元器件用电子浆料和LTCC瓷粉建设项目环境影响报告表
- 会计学专业导论PPT
- 《凯悦酒店》课件
- 信用卡分期还款手写申请书
- 造价咨询招标代理服务方案
评论
0/150
提交评论