题花

网络安全面试题-针对当前网络安全的热点事件OPENSSL以及Struts2漏洞 2014-04-20

1. 了解不了解openssl?知道最近爆出的openssl漏洞吗?怎么补救? openssl是为网络通信提供安全及数据完整性的一种安全协议,囊括了主要的密码算法、常用的密钥和证书封装管理功能以及SSL协议,并...

关于网络安全方面的岗位面试题目 2012-04-16

第一部分、知识面考察 (总分50分) 说明:此部分为考察应聘者知识面广度,包含了50条判断题,答对每题得1分,答错得-1分,放弃得0分。每一个应聘技术岗位的面试者都要回答本部分问题。 (01~10题 计...

关于某知名网络安全公司的面试笔试 2012-04-16

虽然考题大部分是一些基础词题,但是明显可以看得出来,如果没有深厚的功底,是答不好的。我报网络安全工程师。 1.描述tcp的三次插手,写出syn ack的关系 我答:第一次握手:建立连接时,客户端发...

网络安全技术面试题 2012-04-16

1,一台服务器有两个IP地址,一个是内部的IP一个是外部的,只有内部的IP能够访问服务器的80端口,现在你有一个普通用户的帐号和密码,问怎么能让外部的IP访问到WEB服务,请写出详细攻击的步骤  ...

how to make your system more secure, and keep it performing better 2011-10-10

There are several things you should do to make your system more secure, and keep it performing better.: Change your file view settings on Windows systems so you will see all file ext

how to Remove Viruses 2011-10-10

Removing viruses can be risky to your operating system and may cause you to need to re-install your operating system. If you do not feel comfortable with the instructions in this sec

How Viruses Work 2011-10-10

How Viruses Work When a victim of a virus double clicks on an infected attachment, the virus will run. The virus will modify the victim’s system so it will always be active when t

how to protect your computer from worm? 2011-10-10

There are three defenses against worms. They are as follows: A personal firewall should be run on any system that is not behind a corporate firewall. This should be done on any compu

What is a Firewall? 2011-10-10

A firewall is a device that limits access to your system from the outside. A firewall may be a software program running on your computer or it may be a piece of hardware outside your

How Viruses or Worms Spread 2011-10-10

Most commonly viruses today use e-mail to spread however they have used one or more of the following methods to spread in the past. Some viruses will load themselves onto any part of

Virus Damage 2011-10-10

In most cases, viruses can do any amount of damage the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can als

木马的传播途径主要有哪些? 2011-07-10

木马主要是依靠邮件、下载等途径进行传播 木马也可以通过各种脚本进行传播。比如,IE浏览器在执行脚本时存在一些漏洞,入侵者可以利用这些漏洞进行木马的传播与种植。当目标主机执行了木马的服务...

如何判断计算机可能已经中马? 2011-07-10

计算机系统运行速度减慢。 计算机系统经常无故发生死机。 计算机系统中的文件长度发生变化。 计算机存储的容量异常减少。 系统引导速度减慢。 丢失文件或文件损坏。 ...

网络安全方面的面试题 2011-07-10

1. 如何预防和检测宏病毒? 2. 如何预防和检测PE病毒? 3. 如何检测和清除t-mouse这样的三线程程序? 4、如何预防和检测恶意网页移动代码? 5、如何预防和检测木马以及后门程序? 6、如何预防和检...

恶意软件的定义 2011-07-10

恶意软件-Malicious Software,malware 把未经授权便干扰或破坏计算机系统/网络功能的程序或代码(一组指令)称之为恶意程序。 一组指令:可能是二进制文件,也可能是脚本语言/宏语言等。