当前位置:网站首页>2022 Guangxi Autonomous Region secondary vocational group "Cyberspace Security" competition and its analysis (super detailed)
2022 Guangxi Autonomous Region secondary vocational group "Cyberspace Security" competition and its analysis (super detailed)
2022-07-06 01:20:00 【Lonely fish】
2022 Secondary vocational group of Guangxi Autonomous Region in “ Cyberspace Security ” Event module B analysis
- 2022 Guangxi autonomous region competition assignment of secondary vocational group
- modular A Infrastructure setting and security reinforcement (200 branch )
- modular B Network security event response 、 Digital forensics investigation and application security (400 branch )
- modular C CTF Flag capture - attack (200 branch )
- modular D CTF Flag capture - defense (200 branch )
- If you don't understand, you can send a private letter to the blogger !
2022 Guangxi autonomous region competition assignment of secondary vocational group
One 、 Competition time
A total of :360 minute
Module number Module name Competition time ( Hours ) A weight
A Infrastructure setting and security reinforcement 1.5 20%
B Network security event response 、 Digital forensics investigation and application security 1.5 40%
C CTF Flag capture - attack 1.5 20%
D CTF Flag capture - defense 1.5 20%
modular A Infrastructure setting and security reinforcement (200 branch )
One 、 Project and task description :
Suppose you are a network security engineer in an enterprise , For enterprise server system , Ensure the normal operation of all services according to the task requirements , And through the comprehensive use of login and password
边栏推荐
- Zhuhai laboratory ventilation system construction and installation instructions
- Netease smart enterprises enter the market against the trend, and there is a new possibility for game industrialization
- 朝招金安全吗 会不会亏损本金
- Blue Bridge Cup embedded stm32g431 - the real topic and code of the eighth provincial competition
- File upload vulnerability test based on DVWA
- What is the most suitable book for programmers to engage in open source?
- Programmer growth Chapter 9: precautions in real projects
- Questions about database: (5) query the barcode, location and reader number of each book in the inventory table
- SPIR-V初窥
- Four commonly used techniques for anti aliasing
猜你喜欢

伦敦银走势中的假突破

The population logic of the request to read product data on the sap Spartacus home page

IP storage and query in MySQL

关于softmax函数的见解

282. Stone consolidation (interval DP)

Differences between standard library functions and operators

现货白银的一般操作方法

Blue Bridge Cup embedded stm32g431 - the real topic and code of the eighth provincial competition

Ubantu check cudnn and CUDA versions

Threedposetracker project resolution
随机推荐
Test de vulnérabilité de téléchargement de fichiers basé sur dvwa
Zhuhai laboratory ventilation system construction and installation instructions
黄金价格走势k线图如何看?
JMeter BeanShell的基本用法 一下语法只能在beanshell中使用
Unity | 实现面部驱动的两种方式
Convert binary search tree into cumulative tree (reverse middle order traversal)
Is chaozhaojin safe? Will it lose its principal
Fibonacci number
General operation method of spot Silver
Four commonly used techniques for anti aliasing
Yii console method call, Yii console scheduled task
Finding the nearest common ancestor of binary search tree by recursion
About error 2003 (HY000): can't connect to MySQL server on 'localhost' (10061)
Kotlin basics 1
The growth path of test / development programmers, the problem of thinking about the overall situation
普通人下场全球贸易,新一轮结构性机会浮出水面
Recoverable fuse characteristic test
internship:项目代码所涉及陌生注解及其作用
Leetcode 208. Implement trie (prefix tree)
SPIR-V初窥