¿É×ö°ÂÅô¸÷ԺУ×÷Òµ¡¢¹ú¿ªÐο¼×÷Òµ¡¢ÔÚÏß×÷Òµ¡¢ÀëÏß×÷Òµ¡¢±ÏÒµÂÛÎÄ£¬ ΢ÐÅ£ºwxxygzs
ÄÏ¿ª21ÇïѧÆÚ£¨1709¡¢1803¡¢1809¡¢1903¡¢1909¡¢2003¡¢2009¡¢2103£©¡¶¹¥·À¼¼Êõ»ù´¡¡·ÔÚÏß×÷Òµ
ÊÔ¾í×Ü·Ö:100 µÃ·Ö:100
Ò»¡¢µ¥Ñ¡Ìâ (¹² 25 µÀÊÔÌâ,¹² 50 ·Ö)
1.½ø³ÌʹÓõÄÄÚ´æÇøÓòÓÐ()¡£
A.´úÂëÇøºÍÊý¾ÝÇø
B.Êý¾ÝÇøºÍ¶ÑÕ»Çø
C.´úÂëÇø¡¢Êý¾ÝÇøºÍ¶ÑÕ»Çø
D.Êý¾ÝÇøºÍ´úÂëÇø
2.ÒÔÏÂÄÄÏîÖ¸ÁîÈ«²¿ÊôÓÚËãÊýÔËËãÖ¸Áî()
A.MOV¡¢ADD¡¢ADC
B.PUSH¡¢POP¡¢LOOP
C.INC¡¢SUB¡¢AND
D.ADD¡¢SBB¡¢MUL
3.ÒÔÏÂÓйØMetasploitÃüÁî´íÎóµÄÊÇ()
A.show exploits»áÏÔʾMetasploit¿ò¼ÜÖÐËùÓпÉÓõÄÉø͸¹¥»÷Ä£¿é¡£
B.µ±ÄãÏëÒª²éÕÒij¸öÌض¨µÄÉø͸¹¥»÷¡¢¸¨Öú»ò¹¥»÷ÔغÉÄ£¿éʱ£¬searchÃüÁî·Ç³£ÓÐÓá£
C.show auxiliary»áÏÔʾËùÓеĸ¨ÖúÄ£¿éÒÔ¼°ËüÃǵÄÓÃ;¡£
D.show payloads»áÁгöÕâ¸öÄ£¿éËùÐèµÄ¸÷ÖÖ²ÎÊý¡£
4.ÒÔÏÂÄÄÏî²»ÊÇÒ»¾ä»°Ä¾Âí()¡£
A.
B.
C.
D.
5.©¶´Ò²³ÆΪ(),ÊǼÆËã»úϵͳµÄÓ²¼þ¡¢Èí¼þ¡¢ÐÒéÔÚϵͳÉè¼Æ¡¢¾ßÌåʵÏÖ¡¢ÏµÍ³ÅäÖûò°²È«²ßÂÔÉÏ´æÔÚµÄȱÏÝ¡£
A.»úÃÜÐÔ
B.²»ÍêÕûÐÔ
C.¿É·ñÈÏÐÔ
D.´àÈõÐÔ
6.µ±´«Êä²ãûÓнøÐа²È«±£»¤Ê±,»áÓöµ½()°²È«Íþв¡£
A.MITM
B.XSS
C.SQL
D.SSRF
7.¶ÑÊdzÌÐòÔËÐÐʱ¶¯Ì¬·ÖÅäµÄÄÚ´æ,Óû§Ò»°ãͨ¹ý()¡¢newµÈº¯ÊýÉêÇëÄÚ´æ¡£
A.scanf
B.printf
C.malloc
D.free
8.ÒÔÏÂ˵·¨´íÎóµÄÊÇ()
A.Heap SprayÒ²³ÆΪ¶ÑÅçÈ÷¼¼Êõ£¬ÊÇÔÚshellcodeµÄÇ°Ãæ¼ÓÉÏ´óÁ¿µÄ»¬°åÖ¸Á×é³ÉÒ»¸ö·Ç³£³¤µÄ×¢Èë´úÂë¶Î¡£
B.»¬°åÖ¸ÁîÊÇÓÉ´óÁ¿NOP¿ÕÖ¸Áî0x90Ìî³ä×é³ÉµÄÖ¸ÁîÐòÁУ¬µ±Óöµ½ÕâЩNOPÖ¸Áîʱ£¬CPUÖ¸ÁîÖ¸Õë»áÒ»¸öÖ¸Áî½ÓÒ»¸öÖ¸ÁîµÄÖ´ÐÐÏÂÈ¥£¬Öм䲻×öÈκξßÌå²Ù×÷¡£
C.Heap SprayµÄÄÚ´æÕ¼Ó÷dz£Ð¡£¬¼ÆËã»ú¿ÉÒÔÕý³£ÔËת£¬Òò¶ø²»ÈÝÒ×±»²ì¾õ¡£
D.Ö§³ÖÓ²¼þDEPµÄCPU»á¾Ü¾øÖ´Ðб»±ê¼ÇΪ²»¿ÉÖ´ÐеÄ(NX)ÄÚ´æÒ³µÄ´úÂë¡£
9.ÒÔÏÂÓйØSQL˵·¨´íÎóµÄÊÇ()¡£
A.SQLÊÇÓÃÓÚ·ÃÎʺʹ¦ÀíÊý¾Ý¿âµÄ±ê×¼µÄ¼ÆËã»úÓïÑÔ¡£
B.SQLÓÉÊý¾Ý¶¨ÒåÓïÑÔ£¨DDL£©ºÍÊý¾Ý²Ù×÷ÓïÑÔ£¨DML£©Á½²¿·Ö×é³É¡£
C.DDLÓÃÓÚ¶¨ÒåÊý¾Ý¿â½á¹¹£¬DMLÓÃÓÚ¶ÔÊý¾Ý¿â½øÐвéѯ»ò¸üС£
D.DDLÖ÷ÒªÖ¸ÁîÓÐSELECT¡¢CREATEµÈ¡£
10.()ÊÇÖ¸¹¥»÷Õß±ØÐëÔÚ±¾»úÓµÓзÃÎÊȨÏÞµÄÇ°ÌáϲÅÄܹ¥»÷²¢ÀûÓõÄÈí¼þ©¶´¡£
A.±¾µØÀûÓ鶴
B.Ô¶³ÌÀûÓ鶴
C.»º´æÇøÒç³ö©¶´
D.Éè¼Æ´íÎ󩶴
11.Éø͸²âÊÔÊÇͨ¹ý(),À´ÆÀ¹À¼ÆËã»úÍøÂçϵͳ°²È«µÄÒ»ÖÖÆÀ¹À·½·¨¡£
A.Ä£Äâ¶ñÒâºÚ¿ÍµÄ¹¥»÷·½·¨
B.¶ñÒâºÚ¿ÍµÄ¹¥»÷·½·¨
C.°²È«²âÊԵĹ¥»÷·½·¨
D.Ó°ÏìÒµÎñϵͳÕý³£ÔËÐеĹ¥»÷·½·¨
12.²¡¶¾ÊÇÖ¸±àÖÆ»òÕßÔÚ¼ÆËã»ú³ÌÐòÖвåÈëµÄÆÆ»µ¼ÆËã»ú¹¦ÄÜ»òÕßÆÆ»µÊý¾Ý,Ó°Ïì¼ÆËã»úʹÓò¢ÇÒÄܹ»×ÔÎÒ¸´ÖƵÄÒ»×é()¡£
A.¼ÆËã»úÖ¸Áî
B.³ÌÐò´úÂë
C.Îļþ
D.¼ÆËã»úÖ¸Áî»òÕß³ÌÐò´úÂë
13.ÏÂÃæ˵·¨ÕýÈ·µÄÊÇ()¡£
A.Ò»°ãÀ´Ëµ£¬´æ´¢Ê½XSSµÄ·çÏÕ»á¸ßÓÚ·´ÉäʽXSS¡£
B.´æ´¢ÐÍXSSÒ»°ãÒªÇó¹¥»÷ÕßÓÕʹÓû§µã»÷Ò»¸ö°üº¬XSS´úÂëµÄURLÁ´½Ó¡£
C.·´ÉäʽXSSÔòÖ»ÐèÈÃÓû§²é¿´Ò»¸öÕý³£µÄURLÁ´½Ó£¬¶øÕâ¸öÁ´½ÓÖд洢ÁËÒ»¶Î½Å±¾¡£
D.´æ´¢ÐÍXSS»á¸Ä±äÒ³ÃæURLµÄÔÓнṹ¡£
14.Ç°Õû¸öÉø͸²âÊÔ·½ÌáÌåϵÖÐ×îÈÝÒ×±»ºöÂÔ¡¢×î²»±»ÖØÊÓ¡¢×îÒ×ÊÜÈËÎó½âµÄÒ»»·ÊÇ()¡£
A.Ç°ÆÚ½»»¥
B.©¶´·ÖÎö
C.ÐÅÏ¢ËѼ¯
D.Íþв½¨Ä£
15.ÏÂÃæ¹ØÓÚSQLÃüÁî¼°¶¯×÷ÕýÈ·µÄÊÇ()¡£
A.SELECT ·µ»ØÆ¥ÅäÌض¨ÌõÄ¿µÄÊý¾Ý
B.UNION ½«Á½¸ö»ò¶à¸ö²éѯµÄ½á¹ûºÏ²¢µ½Ò»¸ö½á¹û¼¯ÖÐ
C.LIKE ½«²éѯ½á¹ûÏÔʾΪ²»Í¬ÁÐÃûµÄÃû³Æ
D.INSERT ÓÃÐÂÖµ¸üÐÂËùÓÐÆ¥ÅäÐеÄijÁÐ
16.()ÊÇÖ¸Èí¼þÉè¼ÆÕß»ò¿ª·¢Õß·¸ÏµĴíÎó,Êǵ¼Ö²»ÕýÈ·½á¹ûµÄÐÐΪ,Ëü¿ÉÄÜÊÇÓÐÒâÎÞÒâµÄÎó½â¡¢¶ÔÎÊÌ⿼ÂDz»È«ÃæËùÔì³ÉµÄ¹ýʧµÈ¡£
A.Fault
B.Hole
C.Weakness
D.Error
17.ÒÔÏÂ˵·¨ÕýÈ·µÄÊÇ()¡£
A.MetasploitÏîÄ¿×î³õÓÉHD MooreÔÚ2005ÄêÏļ¾´´Á¢¡£
B.Metasploit v2°æ±¾ÎªMetasploit´ÓÒ»¸öÉø͸¹¥»÷¿ò¼ÜÐÔÈí¼þ»ªÀö±äÉíΪ֧³ÖÉø͸²âÊÔÈ«¹ý³ÌµÄÈí¼þƽ̨´òϼáʵµÄ»ù´¡¡£
C.³ýÁËÉø͸¹¥»÷Ö®Í⣬MetasploitÔÚ·¢Õ¹¹ý³ÌÖÐÖð½¥Ôö¼Ó¶ÔÉø͸²âÊÔÈ«¹ý³ÌµÄÖ§³Ö£¬°üÀ¨Ç鱨ËѼ¯¡¢Íþв½¨Ä£¡¢Â©¶´·ÖÎö¡¢ºóÉø͸¹¥»÷Ó뱨¸æÉú³É¡£
D.Metasploit°æ±¾¶¼¿ÉÒÔ×Ô¶¯Éú³É±¨¸æ¡£
18.ÍøÂçºÚ¿Í²úÒµÁ´ÊÇÖ¸ºÚ¿ÍÃÇÔËÓü¼ÊõÊÖ¶ÎÈëÇÖ·þÎñÆ÷»ñÈ¡Õ¾µãȨÏÞÒÔ¼°¸÷ÀàÕË»§ÐÅÏ¢²¢´ÓÖÐıȡ()µÄÒ»Ìõ²úÒµÁ´¡£
A.·Ç·¨¾¼ÃÀûÒæ
B.¾¼ÃЧÒæ
C.ЧÒæ
D.ÀûÈó
19.ÒÔÏÂÄÄÏî²»ÊÇPHPµÄ×¢ÊÍ·ûºÅ()¡£
A.#//
B.--+
C./* */
20.Èä³æÓëÆÕͨ²¡¶¾Ïà±ÈÌØÓеÄÐÔÖÊΪ()¡£
A.´«²¥ÐÔ
B.Òþ±ÎÐÔ
C.²»ÀûÓÃÎļþ¼ÄÉú
D.ÆÆ»µÐÔ
21.Èí¼þ¾²Ì¬°²È«¼ì²â¼¼ÊõÊÇÕë¶Ô()µÄÈí¼þËù¿ªÕ¹µÄ°²È«·ÖÎö²âÊÔ¼¼Êõ¡£
A.ÔËÐÐ״̬
B.µ÷ÊÔ״̬
C.δ´¦ÓÚÔËÐÐ״̬
D.±àÒë״̬
22.ÒÔÏÂÑ¡ÏîÖÐÄ¿Ç°ÊÀ½çÉÏÊý¾ÝÁ¿×î´ó,ÌõÄ¿×î¶àµÄ©¶´Êý¾Ý¿âÖ®Ò»µÄÊÇ()¡£
A.CNNVD
B.NVD
C.CVE
D.CNVD
23.ÏÂÃæ¹ØÓÚ°²È«±à³ÌʱÐèÒª¿¼ÂǵÄÔÔò´íÎóµÄÊÇ()¡£
A.Êý¾ÝµÄ»úÃÜÐÔ
B.Êý¾ÝµÄÍêÕûÐÔ
C.Êý¾ÝµÄ¿ÉÓÃÐÔ
D.Êý¾ÝµÄÓÐЧÐÔ
24.()ÄÜ·¢ÏÖÈí¼þÉè¼Æ»òÈí¼þ±àÂëÖдæÔÚµÄÎÊÌâ²¢½øÐÐÐÞ¸Ä,´Ó¶ø±£Ö¤Èí¼þµÄÖÊÁ¿¡£
A.Èí¼þÉè¼Æ
B.³ÌÐò±àÂë
C.³ÌÐòÉè¼Æ
D.Èí¼þ²âÊÔ
25.ÒÔÏÂÄÄÏîÉÏ´«µÄÎļþ²»»áÔì³ÉΣº¦()¡£
A.ľÂí
B.Îı¾Îļþ
C.¶ñÒâ½Å±¾
D.Webshell
¶þ¡¢ÅжÏÌâ (¹² 25 µÀÊÔÌâ,¹² 50 ·Ö)
26.ºÚÏä²âÊÔµÄʱºò,Éø͸ÕßÍêÈ«´¦ÓÚ¶ÔϵͳһÎÞËùÖªµÄ״̬¡£
27.»º³åÇøÒç³öÒ»°ãÊÇͨ¹ý¸²¸Ç¶ÑÕ»Öеķµ»ØµØÖ·,ʹ³ÌÐòÌøתµ½shellcode»òÖ¸¶¨³ÌÐò´¦Ö´ÐС£
28.Windows XP¼°Æä֮ǰµÄ²Ù×÷ϵͳ,ÓжÔijЩÄÚ´æÇøÓòµÄ´úÂëÖ´ÐнøÐÐÏÞÖÆ¡£
29.±¾µØÀûÓ鶴ÊÇÖ¸¹¥»÷Õß¿ÉÒÔÖ±½Óͨ¹ýÍøÂç·¢Æð¹¥»÷²¢ÀûÓõÄÈí¼þ©¶´¡£
30.°´ÕÕÈí¼þ¹¤³Ì¿ª·¢³öÀ´µÄÈí¼þÒ»¶¨²»´æÔÚ°²È«Â©¶´¡£
31.¶Ñ¿Õ¼äÊÇÓɵ͵ØÖ·Ïò¸ßµØÖ··½ÏòÔö³¤,¶øÕ»¿Õ¼ä´Ó¸ßµØÖ·ÏòµÍµØÖ··½ÏòÔö³¤¡£
32.¾²Ì¬°²È«¼ì²â¼¼ÊõÊÇͨ¹ýʵ¼ÊÔËÐз¢ÏÖÎÊÌâ,ËùÒÔ¼ì²â³öµÄ°²È«È±ÏݺÍ©¶´×¼È·Âʷdz£¸ß,Îó±¨Âʺܵ͡£
33.ÎļþÉÏ´«Â©¶´ÊÇÖ¸ÍøÂç¹¥»÷ÕßÉÏ´«ÁËÒ»¸öÎļþµ½·þÎñÆ÷²¢Ö´ÐС£
34.Ö÷¶¯ÐÅÏ¢ÊÕ¼¯ºÍ±»¶¯ÐÅÏ¢ÊÕ¼¯Ïà·´,Ö÷¶¯ÊÕ¼¯»áÓëÄ¿±êϵͳÓÐÖ±½ÓµÄ½»»¥,´Ó¶øµÃµ½Ä¿±êϵͳÏà¹ØµÄһЩÇ鱨ÐÅÏ¢¡£
35.Èí¼þ²âÊÔ¹ý³Ì·Öµ¥Ôª²âÊÔ¡¢¼¯³É²âÊÔÒÔ¼°ÏµÍ³²âÊÔÈý¸ö½×¶Î½øÐС£
36.¶Î¼Ä´æÆ÷Ö÷ÒªÓÃÀ´´æ·Å²Ù×÷ÊýµÄµØÖ·,ÓÃÓÚ¶ÑÕ»²Ù×÷ºÍ±äÖ·ÔËËãÖмÆËã²Ù×÷ÊýµÄÓÐЧµØÖ·¡£
37.È«Ãæ·ÀÓùÔÔòÊÇÕë¶ÔÈí¼þµÄ²»Í¬Ê¹ÓÃÓû§¡¢²»Í¬³ÌÐò»òº¯Êý,ÔÚ²»Í¬µÄ»·¾³ºÍʱ¼ä¸øÓ費ͬµÄȨÏÞ¡£
38.WebShell¾ÍÊÇÒÔasp¡¢php¡¢jsp»òÕßcgiµÈÍøÒ³ÎļþÐÎʽ´æÔÚµÄÒ»ÖÖÃüÁîÖ´Ðл·¾³,Ò²¿ÉÒÔ½«Æä³Æ֮ΪһÖÖÍøÒ³ºóÃÅ¡£
39.MetasploitÄ£¿éÖеÄËùÓвÎÊýÖ»ÓÐsetÒ»¸ö״̬¡£
40.VINEÊÇBitBlazeµÄ¾²Ì¬·ÖÎöÄ£¿é,Ëü·ÖΪǰ¶ËºÍºó¶ËÁ½²¿·Ö,Ç°¶ËÓÃÀ´ÔÚVINEILÉÏ×ö¾²Ì¬·ÖÎö,ºó¶Ë½«¶þ½øÖÆÖ¸ÁîÌáÉýΪVINEÖмäÓïÑÔ¡£
41.Èí¼þȱÏÝ»áÔì³ÉÈí¼þ±¼À£²»ÄÜÔËÐС£
42.MITREÊÇÒ»¸öÊÜÃÀ¹ú×ÊÖúµÄ»ùÓÚÂéÊ¡Àí¹¤Ñ§Ôº¿ÆÑлú¹¹ÐγɵķÇÓ®Àû¹«Ë¾¡£
43.Éø͸²âÊÔ»áÓ°ÏìÒµÎñϵͳÕý³£ÔËÐС£
44.CPU±¾ÉíÖ»¸ºÔðÔËËã,²»¸ºÔð´¢´æÊý¾Ý¡£Êý¾ÝÒ»°ã¶¼´¢´æÔÚÄÚ´æÖ®ÖÐ,CPUÒªÓõÄʱºò¾ÍÈ¥ÄÚ´æ¶ÁдÊý¾Ý¡£
45.SSHÐÒé¿ÉÒÔʵÏÖInternetÉÏÊý¾Ý´«ÊäµÄ°²È«,ͨ¹ýÀûÓÃÊý¾Ý¼ÓÃܼ¼Êõ,Ëü¿ÉÈ·±£Êý¾ÝÔÚÍøÂçÉÏ´«Êä²»»á±»½ØÈ¡»òÕßÇÔÌý¡£
46.»º³åÇøÊÇÒ»¿é²»Á¬ÐøµÄÄÚ´æÇøÓò,ÓÃÓÚ´æ·Å³ÌÐòÔËÐÐʱ¼ÓÔص½ÄÚ´æµÄÔËÐдúÂëºÍÊý¾Ý¡£
47.FailureÊÇÖ¸Ö´ÐдúÂëºóËùµ¼ÖµIJ»ÕýÈ·µÄ½á¹û,Ôì³Éϵͳ»òϵͳ²¿¼þ²»ÄÜÍê³ÉÆä±ØÐèµÄ¹¦ÄÜ,Ò²¿ÉÒÔ³ÆΪ¹ÊÕÏ¡£
48.ΪÁËÌá¸ßÆÙ²¼Ä£Ð͵Ŀª·¢Ð§ÂÊ,ÔÚϵͳµÄ¼Ü¹¹Éè¼ÆÍê³Éºó,¿É½«ÏµÍ³·ÖΪ¶à¸ö¿É²¢Ðпª·¢µÄÄ£¿é¡£
49.HTTPÊdz¤Á¬½Ó,ÏÂÒ»´ÎÁ¬½ÓÓëÉÏÒ»´ÎÓйء£
50.ÓЩ¶´²»Ò»¶¨¾ÍÓÐExploit(ÀûÓÃ),µ«ÊÇÓÐExploit¾Í¿Ï¶¨ÓЩ¶´¡£