Windows NT和Windows2000系统可以在几次无效登录后锁定账号,这可以防止( )。
- A.木马
- B.IP欺骗
- C.暴力攻击
- D.缓存溢出攻击
正确答案及解析
正确答案
解析
本题考查网络安全的知识。
木马:木马(Trojan),也称木马病毒,是指通过特定的程序木马程序来控制另一台计算机。木马通常有两个可执行程序,一个是控制端,另一个是被控制端。
IP欺骗:IP地址欺骗是指行动产生的IP数据包为伪造的源IP地址,以便冒充其他系统或发件人的身份。这是一种黑客的攻击形式,黑客使用一台计算机上网,而借用另外一台机器的IP地址,从而冒充另外一台机器与服务器打交道。
暴力攻击:是指攻击者提供系统的组合所有可能性,尝试所有可能去破解用户账号、密码等私密信息,通常会用自动化的脚本组合正确的用户名和密码。
缓存溢出攻击:是指在存在缓存溢出安全漏洞的计算机中,攻击者可以用超出常规长度的字符数来填满一个域,通常是内存区地址。
综合分析,Windows NT和Windows2000系统可以在几次无效登录后锁定账号,这可以防止暴力攻击,故本题选C。
包含此试题的试卷
你可能感兴趣的试题
Advancements in ( )have contributed to the growth of the automotive industry through the creation and evolution of self-driving vehicles.
-
- A.Artificial Intelligence
- B.Cloud Computing
- C.Internet of Things
- D.Big Data
- 查看答案
In project human resource management , ( )is not a source of power for the project manager.
-
- A.referent power
- B.expert power
- C.reward power
- D.audit power
- 查看答案
At the project establishment stage , the feasibility study mainly includes techinical feasibility analysis , ( ), operation environment feasibility analysis and other aspects of feasibility analysis.
-
- A.detail feasibility analysis
- B.opportunity analysis
- C.economic feasibility analysis
- D.risk analysis
- 查看答案
( )is a grid that shows the project resources assigned to each work package.
-
- A.Stakeholder engagement assessment matrix
- B.Requirements traceability matrix
- C.Probability and impact matrix
- D.Responsibility assignment matrix
- 查看答案
Xinhua News Agency reported in January 2022,Chian will further promote the developmet of a digital economy during the 14th Five-Year Plan eriod(2021-2025). The plan also emphasized industrial ( )transformation.
-
- A.digital
- B.networking
- C.intelligentize
- D.informatization
- 查看答案