当前位置:网站首页>2022 Guangxi Autonomous Region secondary vocational group "Cyberspace Security" competition and its analysis (super detailed)
2022 Guangxi Autonomous Region secondary vocational group "Cyberspace Security" competition and its analysis (super detailed)
2022-07-06 01:20:00 【Lonely fish】
2022 Secondary vocational group of Guangxi Autonomous Region in “ Cyberspace Security ” Event module B analysis
- 2022 Guangxi autonomous region competition assignment of secondary vocational group
- modular A Infrastructure setting and security reinforcement (200 branch )
- modular B Network security event response 、 Digital forensics investigation and application security (400 branch )
- modular C CTF Flag capture - attack (200 branch )
- modular D CTF Flag capture - defense (200 branch )
- If you don't understand, you can send a private letter to the blogger !
2022 Guangxi autonomous region competition assignment of secondary vocational group
One 、 Competition time
A total of :360 minute
Module number Module name Competition time ( Hours ) A weight
A Infrastructure setting and security reinforcement 1.5 20%
B Network security event response 、 Digital forensics investigation and application security 1.5 40%
C CTF Flag capture - attack 1.5 20%
D CTF Flag capture - defense 1.5 20%
modular A Infrastructure setting and security reinforcement (200 branch )
One 、 Project and task description :
Suppose you are a network security engineer in an enterprise , For enterprise server system , Ensure the normal operation of all services according to the task requirements , And through the comprehensive use of login and password
边栏推荐
- DOM introduction
- A glimpse of spir-v
- Use of crawler manual 02 requests
- Leetcode 剑指 Offer 59 - II. 队列的最大值
- MYSQL---查询成绩为前5名的学生
- yii中console方法调用,yii console定时任务
- Remember that a version of @nestjs/typeorm^8.1.4 cannot be obtained Env option problem
- After 95, the CV engineer posted the payroll and made up this. It's really fragrant
- How to see the K-line chart of gold price trend?
- Three methods of script about login and cookies
猜你喜欢
Blue Bridge Cup embedded stm32g431 - the real topic and code of the eighth provincial competition
Unity | two ways to realize facial drive
一圖看懂!為什麼學校教了你Coding但還是不會的原因...
Fibonacci number
Cf:d. insert a progression [about the insert in the array + the nature of absolute value + greedy top-down]
Pbootcms plug-in automatically collects fake original free plug-ins
Questions about database: (5) query the barcode, location and reader number of each book in the inventory table
BiShe - College Student Association Management System Based on SSM
The population logic of the request to read product data on the sap Spartacus home page
VMware Tools安装报错:无法自动安装VSock驱动程序
随机推荐
Who knows how to modify the data type accuracy of the columns in the database table of Damon
一图看懂!为什么学校教了你Coding但还是不会的原因...
Leetcode daily question solution: 1189 Maximum number of "balloons"
A picture to understand! Why did the school teach you coding but still not
Basic process and testing idea of interface automation
Redis' cache penetration, cache breakdown, cache avalanche
A glimpse of spir-v
Cglib dynamic agent -- example / principle
Gartner released the prediction of eight major network security trends from 2022 to 2023. Zero trust is the starting point and regulations cover a wider range
电气数据|IEEE118(含风能太阳能)
基於DVWA的文件上傳漏洞測試
Zhuhai laboratory ventilation system construction and installation instructions
Docker compose配置MySQL并实现远程连接
General operation method of spot Silver
Huawei converged VLAN principle and configuration
Construction plan of Zhuhai food physical and chemical testing laboratory
1791. Find the central node of the star diagram / 1790 Can two strings be equal by performing string exchange only once
Obstacle detection
Opinions on softmax function
Condition and AQS principle