Traditional Culture Encyclopedia - Traditional culture - A few questions 5

A few questions 5

The difference between FTP and Telnet is that Telnet only allows the remote computer to perform limited operations, including viewing files, changing file directories, etc.

The working principle of PING is very simple. It sends a PING

The packet is sent to the remote host to be detected, and waits for the return response packet from the remote host.

To change the start page in IE, you should click "Internet Options" under the "Tools" menu.

In the following "Email Header" information, the title or subject is sent by the user

Title or subject

E-MAIL of the sender

E-MAIL address of the recipient

Email delivery on schedule and time

WEB server is the basic element of WEB

Website

Web page

WEB server

Hyperlink

21. The physical security of computer information includes three aspects: environmental security, equipment security, and c.

A. Operational security B. Media security C. Information security. D. Personnel security

22. a is a barrier set up between the protected network and the external network using comprehensive network technology to separate the protected network from the external network system to prevent unpredictable and Potentially destructive intrusion, it is the only entry and exit for information between different networks or network security domains

A. Firewall technology B. Cryptotechnology C. Access control technology D. Virtual private network

23. b is to achieve the purpose of computer information attack through theft or analysis. It will not cause any changes to the information contained in the system, and the operation and status of the system will not be changed.

< p>A. Active attack B. Passive attack C. Hacker attack D. Computer virus

24. Computer viruses mainly destroy data c.

A. Confidentiality B. Reliability. C. Integrity D. Availability

25. The following statement is correct: None of the above three is correct:

Information leakage only occurs during the transmission of information.

p>

Information leakage only occurs during the storage process of information.

Information leakage only occurs during the transmission and storage process of information.

None of the above three is correct. .

26. The following description of computer viruses is incorrect: Computer viruses spread through the network are much more destructive than stand-alone systems.

Computer viruses are contagious.

Computer viruses spread through the network are much more destructive than stand-alone systems.

Computer viruses are generally difficult to detect if infected. Mainly destroys the integrity of data

27. A computer virus is a:

A. A program B. An infectious virus C. A computer hardware D. Computer system software< /p>

28. The following are not characteristics of computer viruses: c

A. Infectiousness B. Suddenity C. Predictability D. Hiddenness

29 , Computer viruses b

A. All are destructive B. Some viruses are not destructive

C. All destroy .exe files D. Do not destroy data, only files

30. Computer viruses are all man-made.

It is caused by carelessness in the production of computer hardware.

They are all man-made.

You must clear your computer before you can use it.

It is possible that people made it accidentally.