《最新网络安全第二章.doc》由会员分享,可在线阅读,更多相关《最新网络安全第二章.doc(83页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、网络安全第二章(可以直接使用,可编辑 优秀版资料,欢迎下载)窗体顶端What are two characteristics of the SDM Security Audit wizard? (Choose two.) It uses interactive dialogs and prompts to implement AAA。 It automatically enables Cisco IOS firewall and implements Cisco IOS IPS security configurations to secure the router。 It displays
2、a screen with Fixit check boxes to let you choose which potential securityrelated configuration changes to implement。 It requires users to first identify which router interfaces connect to the inside network and which connect to the outside network. It is initiated from CLI and executes a script in
3、which the managment plane functions and forwarding plane services are tested against known vulnerabilities窗体底端窗体顶端Which statement matches the CLI commands to the SDM wizard that performs similar configuration functions? aaa configuration commands and the SDM Basic Firewall wizard auto secure privile
4、ged EXEC command and the SDM OneStep Lockdown wizard classmaps, policymaps, and service-policy configuration commands and the SDM IPS wizard setup privileged EXEC command and the SDM Security Audit wizard 窗体底端窗体顶端Refer to the exhibit. What is the significance of secret 5 in the generated output? The
5、 ADMIN password is encrypted using DH group 5. The ADMIN password is encrypted via the service password-encryption command。 The ADMIN password is hashed using MD5. The ADMIN password is hashed using SHA. 窗体底端窗体顶端Which two operations are required to implement Cisco SDM One-Step Lockdown? (Choose two.
6、) Choose the One-Step Lockdown feature. Apply the documented network policies。 Deliver the configuration changes to the router. Compare the router configuration against recommended settings。 Select the Firewall and ACL task on the SDM Configuration screen。 窗体顶端Refer to the exhibit. Which two stateme
7、nts describe the current SDM logging setup? (Choose two.) Buffered logging will be enabled on the router for Logging Level 7 messages. Buffered logging will be enabled on the syslog server for Logging Level 7 messages. All messages with a trap level of 4 and higher (less critical) will be logged. Al
8、l messages with a trap level of 4 and lower (more critical) will be logged. The router interface IP address that is connected to the syslog server is 192。168。1.3。 The syslog server IP address is 192。168。1.3。 Refer to the exhibit. What two pieces of information can be gathered from the generated mess
9、age? (Choose two.) This message is a level five notification message。 This message appeared because a minor error occurred requiring further investigation。 This message appeared because a major error occurred requiring immediate action. This message indicates that service timestamps have been global
10、ly enabled. This message indicates that enhanced security was configured on the vty ports. Which three areas of router security must be maintained to secure an edge router at the network perimeter? (Choose three。) physical security flash security operating system security remote access security rout
11、er hardening zone isolation 窗体顶端Which set of commands are required to create a username of admin, hash the password using MD5, and force the router to access the internal username database when a user attempts to access the console? R1(config)# username admin password Admin01pa55 R1(config) line con
12、 0 R1(configline)# login local R1(config)# username admin password Admin01pa55 R1(config)# line con 0 R1(configline) login internal R1(config) username admin Admin01pa55 encr md5 R1(config)# line con 0 R1(config-line) login local R1(config) username admin secret Admin01pa55 R1(config) line con 0 R1(
13、config-line)# login local R1(config)# username admin secret Admin01pa55 R1(config) line con 0 R1(configline)# login internal 窗体底端By default, how many seconds of delay between virtual login attempts is invoked when the login blockfor command is configured? one two three four five 窗体顶端An administrator
14、 defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.) configure the IP domain name on the router enable inbound vty Telnet sessions generate the SSH keys
15、configure DNS on the router enable inbound vty SSH sessions generate twoway pre-shared keys 窗体底端Which recommended security practice prevents attackers from performing password recovery on a Cisco IOS router for the purpose of gaining access to the privileged EXEC mode? Keep a secure copy of the rout
16、er Cisco IOS image and router configuration file as a backup。 Disable all unused ports and interfaces to reduce the number of ways that the router can be accessed. Configure secure administrative control to ensure that only authorized personnel can access the router。 Locate the router in a secure lo
17、cked room that is accessible only to authorized personnel. Provision the router with the maximum amount of memory possible. 窗体顶端Refer to the exhibit. Which statement regarding the JR-Admin account is true? JR-Admin can issue show, ping, and reload commands. JRAdmin can issue ping and reload commands
18、。 JRAdmin can issue only ping commands. JRAdmin can issue debug and reload commands. JRAdmin cannot issue any command because the privilege level does not match one of those 窗体底端窗体顶端Refer to the exhibit。 Based on the output of the show running-config command, which type of view is SUPPORT? secret vi
19、ew, with a level 5 encrypted password root view, with a level 5 encrypted secret password superview, containing SHOWVIEW and VERIFYVIEW views CLI view, containing SHOWVIEW and VERIFYVIEW commands 窗体顶端Which two characteristics apply to Role-Based CLI Access superviews? (Choose two。) CLI views have pa
20、sswords, but superviews do not have passwords. Users logged in to a superview can access all commands specified within the associated CLI views。 A single superview can be shared among multiple CLI views。 Commands cannot be configured for a specific superview。 Deleting a superview deletes all associa
21、ted CLI views. 窗体顶端If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? (Choose three.) assign a secret password to the view assign commands to the view assign users who can use the view associate the view with the root view create a superview usi
22、ng the parser view viewname command create a view using the parser view view-name command 窗体底端窗体顶端What are three requirements that must be met if an administrator wants to maintain device configurations via secure inband management? (Choose three.) network devices configured to accommodate SSH a sep
23、arate network segment connecting all management devices at least one router acting as a terminal server encryption of all remote access management traffic connection to network devices through a production network or the Internet direct access to the console ports of all network devices 窗体底端窗体顶端What
24、 are two characteristics of SNMP community strings? (Choose two。) A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in plaintext. Commonly known community strings should be used when configuring secure SNMP。 If the manager sends one of the correct readonly communi
25、ty strings, it can get information and set information in an agent。 SNMP readonly community strings can be used to get information from an SNMPenabled device。 SNMP read-write community strings can be used to set information on an SNMPenabled device。 窗体顶端Refer to the exhibit. Routers R1 and R2 are co
26、nnected via a serial link。 One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.) Both routers are configured to use NTPv2. Router R1 is the m
27、aster, and R2 is the client. Router R2 is the master, and R1 is the client。 The IP address of R1 is 192。168。1.2。 The IP address of R2 is 192。168。1。2. 窗体底端窗体顶端Which three commands are required to restore a primary bootset from a secure archive on a router on which Cisco IOS resilience is enabled? (Ch
28、oose three。) Restart the router in ROM monitor mode and display the secure bootset Cisco IOS image name using the dir command。 Restart the router, enter privileged EXEC mode, and display the secure bootset Cisco IOS image name using the show flash command。 Boot the secure bootset Cisco IOS image usi
29、ng the boot command with the filename。 Copy the secure bootset Cisco IOS image to flash using the copy IOSbackup-image flash command。 Restore the secure configuration file using the copy configbackup flash command. Restore the secure configuration file using the secure bootconfig restore filename co
30、mmand。 窗体顶端Which three options can be configured by Cisco AutoSecure? (Choose three。) CBAC SNMP syslog security banner interface IP address enable secret password 窗体顶端What is the minimum recommended modulus key length for keys generated to use with SSH? 256 512 768 1024 2048 窗体底端窗体顶端An administrator
31、 needs to create a user account with custom access to most privileged EXEC commands。 Which privilege command is used to create this custom account? privilege exec level 0privilege exec level 1privilege exec level 2privilege exec level 15窗体顶端Refer to the exhibit。 What two facts can be determined from
32、 the output? (Choose two.) The Cisco IOS image and configuration files have been properly secured。 ROMmon mode will be inaccessible upon entering the privileged EXEC reload command。 The Cisco IOS Resilient Configuration feature is enabled。 The Cisco IOS Resilient Configuration feature has detected a
33、n image version mismatch. The Cisco IOS configuration files have been erased. 窗体底端Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack? HTTP CDP FTP NTP TFTP 窗体顶端Which statement describes the
34、operation of the Cisco SDM Security Audit wizard? The wizard configures a router to prevent unauthorized access。 The wizard compares a router configuration against recommended settings. The wizard monitors network data and logs possible unauthorized or malicious traffic。 The wizard logs the effectiv
35、eness of network security measures for baseline comparisons窗体底端窗体顶端Which three services on a router does Cisco SDM One-Step Lockdown enable? (Choose three.) SNMP TCP intercepts SSH access to the router Cisco Discovery Protocol password encryption service firewall on all outside interfaces 窗体底端窗体底端窗体
36、底端窗体底端窗体底端窗体底端窗体底端窗体底端窗体底端 1.信息入侵的第一步是().(单选题3分)得分:3分 o A.信息收集o B。目标分析o C.实施攻击o D。打扫战场 2。网络安全法立法的首要目的是( )。(单选题3分)得分:3分 o A。保障网络安全o B.维护网络空间主权和国家安全、社会公共利益o C.保护公民、法人和其他组织的合法权益o D。促进经济社会信息化健康发展 3.信息安全管理要求ISO/IEC27001的前身是()的BS7799标准。(单选题3分)得分:3分 o A.英国o B.美国o C.德国o D.日本 4.信息安全管理针对的对象是()。(单选题3分)得分:3分 o
37、A.组织的金融资产o B。组织的信息资产o C.组织的人员资产o D。组织的实物资产 5。()的攻击原理是构造错误的分片信息,系统重组分片数据时内存计算错误,导致协议栈崩溃。(单选题3分)得分:3分 o A.Ping of deatho B。LANDo C.UDP Floodo D。Teardrop 6.2021年6月21日,英国政府提出了新的规则来保护网络安全,其中包括要求Facebook等社交网站删除( )之前分享的内容。(单选题3分)得分:3分 o A。14岁o B。16岁o C。18岁o D.20岁 7.信息安全管理中最需要管理的内容是()。(单选题3分)得分:3分 o A.目标o B
38、。规则o C。组织o D.人员 8。在我国的立法体系结构中,行政法规是由( )发布的。(单选题3分)得分:3分 o A。全国人大及其常委会o B。国务院o C.地方人大及其常委会o D。地方人民政府 9.蠕虫病毒属于信息安全事件中的().(单选题3分)得分:3分 o A。网络攻击事件o B。有害程序事件o C.信息内容安全事件o D.设备设施故障 10.网络安全法开始施行的时间是( ).(单选题3分)得分:3分 o A。2021年11月7日o B。2021年12月27日o C.2021年6月1日o D.2021年7月6日 11.在我国的网络安全法律法规体系中,属于专门立法的是( ).(多选题4
39、分)得分:4分 o A。网络安全法o B.杭州市计算机信息网络安全保护管理条例o C.保守国家秘密法o D。计算机信息系统安全保护条例 12。拒绝服务攻击的防范措施包括()。(多选题4分)得分:4分 o A。安全加固o B.资源控制o C.安全设备o D。运营商、公安部门、专家团队等 13.下列属于资产的有().(多选题4分)也不是ab得分:0分 o A.信息o B.信息载体o C.人员o D.公司的形象与名誉 14。端口扫描的扫描方式主要包括().(多选题4分)得分:4分 o A.全扫描o B.半打开扫描o C.隐秘扫描o D。漏洞扫描 15。中央网络安全和信息化领导小组的职责包括( )。(
40、多选题4分)得分:4分 o A。统筹协调涉及各个领域的网络安全和信息化重大问题o B.研究制定网络安全和信息化发展战略、宏观规划和重大政策o C。推动国家网络安全和信息法治化建设o D.不断增强安全保障能力 16.计算机后门的作用包括()。(多选题4分)得分:4分 o A.方便下次直接进入o B。监视用户所有隐私o C。监视用户所有行为o D。完全控制用户主机 17.在监测预警与应急处置方面,省级以上人民政府有关部门的职责是( ).(多选题4分)得分:4分 o A。网络安全事件发生的风险增大时,采取信息报送、网络安全风险信息评估、向社会预警等措施o B.按照规定程序及权限对网络运营者法定代表人
41、进行约谈o C.建立健全本行业、本领域的网络安全监测预警和信息通报制度o D。制定网络安全事件应急预案,定期组织演练 18。重要信息安全管理过程中的技术管理要素包括()。(多选题4分)得分:4分 o A。灾难恢复预案o B.运行维护管理能力o C。技术支持能力o D。备用网络系统 19。PDCA循环的内容包括()。(多选题4分)得分:4分 o A.计划o B。实施o C。检查o D.行动 20。计算机后门木马种类包括().(多选题4分)得分:4分 o A。特洛伊木马o B。RootKito C。脚本后门o D。隐藏账号 21.2003年,国家信息化领导小组关于加强信息安全保障工作的意见出台。(
42、判断题3分)得分:3分 o 正确o 错误 22。中国信息安全认证中心( ISCCC)不是我国信息安全管理基础设施之一。(判断题3分)得分:3分 o 正确o 错误 23。良好的风险管理过程是成本与收益的平衡.(判断题3分)得分:3分 o 正确o 错误 24。信息展示要坚持最小化原则,不必要的信息不要发布。(判断题3分)得分:3分 o 正确o 错误 25.网络安全法对地方政府有关部门的网络安全职责未作具体规定,应当依照国家有关规定确定并执行。(判断题3分)得分:3分 o 正确o 错误 26.Who is是一个标准服务,可以用来查询域名是否被注册以及注册的详细资料。(判断题3分)得分:3分 o 正确
43、o 错误 27.个人信息是指通过网络收集、存储、传输、处理和产生的各种电子数据。(判断题3分)得分:3分 o 正确o 错误 28。Ping使用ICMP协议数据包最大为6535。(判断题3分)得分:3分 o 正确o 错误 29.密码字典是密码破解的关键.(判断题3分)得分:3分 o 正确o 错误 30.安全信息系统的实施流程包括需求分析、市场招标、评标、选择供应商、签订合同、系统实施。(判断题3分)得分:3分 o 正确o 错误网络安全技术大纲第1章网络脆弱性的原因1. 开放性的网络环境2. 协议本身的脆弱性3. 操作系统的漏洞4. 人为因素网络安全的定义网络安全是指网络系统的硬件、软件和系统中的
44、数据受到保护,不因偶然的或者恶意的攻击而遭到破坏、更改、泄露,系统联系可靠正常地运行,网络服务不中断。网络安全的基本要素1. 保密性2. 完整性3. 可用性4. 可控性5. 不可否认性课后习题选择题1. 计算机网络的安全是指网(络中信息的安全)。2. 嘻嘻风险主要是指(信息存储安全、信息传输安全、信息访问安全)。3. 以下(数据存储的唯一性)不是保证网络安全的要素。4. 信息安全就是要防止非法攻击和病毒的传播,保障电子信息的有效性,从具体的意义上来理解,需要保证以下(保密性、完整性、可用性、可控性、不可否认性)几个方面5. (信息在理解上出现的偏差)不是信息失真的原因。6. (实体安全)是用来
45、保证硬件和软件本身的安全的。7. 黑客搭线窃听属于信息(传输安全)风险.8. (入网访问控制)策略是防止非法访问的第一档防线。9. 对企业网络最大的威胁是(内部员工的恶意攻击)。10. 在网络安全中,中断指攻击者破坏网络系统的资源,使之变成无效的或无用的,这是对(可用性的攻击)。11. 从系统整体看,“漏洞”包括(技术因素、认得因素、规划,策略和执行该过程)等几方面.问答题网络本身存在哪些安全缺陷?1。伤害身体2.心理方面3。易惹是非4.影响学业5.安全问题6.网络内容的伤害7.社会角色及观念的改变第2章黑客入侵攻击的一般过程1. 确定攻击目标2. 收集被攻击对象的有关信息3. 利用适当的工具进行扫描4. 建立模拟环境,进行模拟攻击5. 实施攻击6. 清除痕迹7. 创建后门扫描器的作用1. 检测主机是否在线2. 扫描目标系统开放的端口3. 获取目标操作系统的敏感信息4. 扫描其他系统的敏感信息常用扫描器1. Nmap2. ISS3. ESM4. 流光(fluxay)5. X-scan6. SSS7. LC网络监听网络监听的一个前提条件是将网卡设置为混杂模式木马的分类1. 远程访问型木马2. 键盘记录木马3. 密码发送型木马4. 破坏型木马5. 代理木马6. FTP木马7. 下载型木马木马的工作过程1.配置木马2。传播木马3.启动木马4