October 11th to October 17th is
Network security publicity week
In this time node
Guang Xiaoming encountered some trouble [123 ]
TA is trapped in the network security secret room
Need everyone to help!
How to solve the Saving Xiaoming to escape the secret room?
(Scanning QR code Savings Summary)
[ 123] Game rules
You need to find 5 different boxes of light-milded area, you can find 5 key-free boxes, open each box, there will be 2 questions about cybersecurity, answer the question before Get the key inside the box.
After the passing of all the keys can participate in the lottery, have the opportunity to win the WeChat red envelope.
Set Qi 5 Put the key to save light Xiaoming
\”Reward gold\” is provided with setting 1.66 Yuan, 2.66 yuan, 3.88 yuan three levels of red envelopes.
Do you know about the rescue rules? In the beginning of the rescue, Guangmingjun will give you the answer question bank, let everyone save the successful success, the success of the promotion
Network security knowledge Q \u0026 A (bold is an answer ~)
1, as my country Basic law in the field of network security, the implementation time of the People’s Republic of China Network Security Law is ().
A. May 1, 2017
B. June 1, 2017
C. August 1, 2017
2. Which laws and regulations will be implemented from November 1 this year?
A. \”Personal Information Protection Law\”
C. \”Network Security Review Measures\”
3, the country () is responsible for coordinating network security work and related supervision and management.
C. Net Letter Department
4, which Behavior may cause the computer to be installed Trojan ()
a. Search download can watch a new broadcast TV drama player
b. Find a unfamiliar email in the mailbox, anti-virus download mailAttachment
c. When downloading resources, give priority to a high security green website
6, \”only one mobile phone, if you don’t leave your home It can be easily earned a few hundred yuan … \”When seeing such network part-time brush advertising, the most appropriate practice is ()
a. Try to try, anyway, it is also idle [123
b. Contact and see, maybe true
c. \”Brush single\” is commercial violation, consciously resistant
7, Friends send a website link to request voting, the most reasonable approach is ().
a. Do not participate in any vote
, after confirming, then discretion
c. Put your friends \”pull black\”
8. For the brush news, watch video, earning steps to \”make money benefits\” to attract users to download registered App, the following statement is correct ()
a. Registration identity verification information To prevent the behavior of the gift
b. Forwarding the \”set praise\” link will not lead to personal information disclosure
c. It often has difficulty withdrawn, because personal contributions are very Limited
9, the junior high school student A found that a WeChat public number has a \”broke the news\” article, and it is a \”slag man\”. Small A Contacts the other party asked to delete the post, and if you want to delete your post fee. In this regard, the most appropriate processing method is ()
a. Broadcasting disaster, finding a classmate enough 2000 pieces to pay for the other party
b. Keep evidence, in time to tell the parents, And report to the public security organ
c. If you don’t pay attention to
10, I found that the computer infected virus must first disconnect the network, the most important The purpose is ()
a. Prevent information data to be stealing
b. Control the virus outward spread
c. Prevent the computer from being further infected
Have you remember?
Remember, let’s come together to come together to escape the online security secret room ~
Finally, share some network security Knowledge upside down
Content Source | Shenzhen Guangming District Internet Information Office