Traditional Culture Encyclopedia - Traditional festivals - 20 17 Shandong secret knowledge answering activity questions and answers (5)

20 17 Shandong secret knowledge answering activity questions and answers (5)

38. The whereabouts of documents, materials or other articles belonging to state secrets are unknown. Since the date of discovery, the top secret, confidential or secret level have not been found in (1), which shall be regarded as leaks.

A 10, 60th B 15, 60th C 10, 30th.

39, the end of the leak investigation work time for (c).

A 6 months B 1 month C 3 months

40. The leaking organ or unit shall make a written report to the relevant secrecy administrative department within 3 hours after discovery.

A 60 B 48 C 24

4 1. Cases of disclosing top secret state secrets to overseas organizations and institutions shall be organized or investigated by (b).

A province, autonomous region and municipality directly under the Central Government, and B state secrecy administrative department.

Secret departments of central state organs

42. Anyone who negligently discloses top secret (1), secret (3) or secret (4) shall be placed on file.

A 1,2,3 B 1,3,3 C 1,3,4

43, for dereliction of duty, irresponsible, wrong, leakage in the secret determination work, resulting in the disclosure of state secrets, or hinder the normal communication, resulting in the loss of national interests, should be investigated according to the seriousness of the case (a).

A administrative responsibility b criminal responsibility c law and discipline responsibility

Three. Short answer questions (***6 questions)

1. What are the "ten taboos" of computer management that confidential personnel should abide by?

Answer (1): Confidential computers are not allowed to surf the Internet;

(2) Confidential computers shall not use wireless keyboards, mice and wireless network cards;

(3) Confidential computers shall not install software of unknown origin, and shall not copy other people's files at will;

(4) Confidential computers and confidential mobile storage media shall not be used, kept or consigned by others;

(5) Without professional confidentiality, confidential computers and confidential mobile storage media shall not be eliminated;

(6) Computers connected to the Internet in classified places shall not install, equip and use video and audio input devices such as cameras;

(7) Removable storage media shall not be used interchangeably between classified computers and non-classified computers;

(8) Do not store or process confidential information on the Internet;

(9) Do not use ordinary fax machines or all-in-one machines to transmit and process confidential information;

(10) It is forbidden to talk about state secrets or send confidential information through mobile communication tools such as mobile phones.

2. What are the four requirements for the security of classified computer information systems?

A: It includes physical security, operational security, information security and security management.

3. What are the key departments and parts of confidentiality?

A: Departments involved in the internal business work of the unit are classified as confidential departments. The special place for centralized production, storage and custody of state secret carriers within the unit is the key part of confidentiality.

4. What protective measures are there for confidential key departments and parts?

Answer: (1) Key secrecy departments should have security and confidentiality isolation measures and install anti-theft alarm devices;

(2) Confidential key departments involving confidential and top-secret state secrets shall install TV monitoring system, access control system, IC card or physiological identification and security personnel;

(3) The carrier storing state secrets shall be equipped with a password filing cabinet, and the carrier storing top secret state secrets shall be equipped with a password safe.

5. What major security measures should be taken for important confidential meetings?

A: Large or important secret-related meetings should be held in internal places; If it is really necessary to hold it in an external place, the host department shall formulate a confidential work plan and solicit the opinions of the confidential work organization; Technical inspection of the security and confidentiality of the venue; Participants in the meeting should be registered for the record; Conduct confidential education for conference personnel and service personnel; Use mobile phone jammers, low-radiation amplification equipment and radiation shielding devices as required, and do not use wireless microphones.

6. What is the act of revealing state secrets?

A: The act of divulging state secrets refers to the violation of confidentiality laws, regulations and rules, which makes state secrets known to people who should not know; The act of making state secrets beyond the limited scope of contact without proving that people who should not know do not know.

More related issues to share: