When the firewall hard disk is in place, which of the following is correct description for the firewall log?
When the firewall hard disk is in place, which of the following is correct description for the firewall log?A . The administrator can advertise the content log to view the detection and defense records of network threats.B . The administrator can use the threat log to understand the user's security risk behavior...
Regarding the description of the vulnerability scanning, which of the following is wrong?
Regarding the description of the vulnerability scanning, which of the following is wrong?A . Vulnerability scanning is a technology based on network remote monitoring of target network or host security performance vulnerability, which can be used for simulated attack experiments and security audits.B . Vulnerability scanning is used to detect...
Which of the following is true about the description of SSL VPN?
Which of the following is true about the description of SSL VPN?A . Can be used without a clientB . May encrypt to IP layerC . There is a NAT traversal problemD . No authentication requiredView AnswerAnswer: A
According to the protection object, the firewall is divided. Windows Firewall belongs to ________.
According to the protection object, the firewall is divided. Windows Firewall belongs to ________.A . Software firewallB . Hardware firewallC . Stand-alone firewallD . Network firewallView AnswerAnswer: C
IPS (Intrusion Prevention System) is a defense system that can block in real time when intrusion is discovered.
IPS (Intrusion Prevention System) is a defense system that can block in real time when intrusion is discovered.A . TrueB . FalseView AnswerAnswer: A
Common scanning attacks include: port scanning tools, vulnerability scanning tools, application scanning tools, database scanning tools, etc.
Common scanning attacks include: port scanning tools, vulnerability scanning tools, application scanning tools, database scanning tools, etc.A . TrueB . FalseView AnswerAnswer: A
Which of the following statement about the L2TP VPN of Client-initialized is wrong?
Which of the following statement about the L2TP VPN of Client-initialized is wrong?A . After the remote user access to internet, can initiate L2TP tunneling request to the remote LNS directly through the client softwareB . LNS device receives user L2TPconnection request, can verify based on user name and password.C...
Which types of encryption technology can be divided into? (Multiple Choice)
Which types of encryption technology can be divided into? (Multiple Choice)A . Symmetric encryptionB . Asymmetric encryptionC . Fingerprint encryptionD . Data encryptionView AnswerAnswer: AB
Which of the following is the correct description of windows log event type? (Multiple Choice)
Which of the following is the correct description of windows log event type? (Multiple Choice)A . A warning event is a successful operation event of an application, driver, or service.B . Error events usually refer to the loss of function and data. For example, if a service cannot be loaded...
Which of the following types of attacks does the DDoS attack belong to?
Which of the following types of attacks does the DDoS attack belong to?A . Snooping scanning attackB . Malformed packet attackC . Special message attackD . Traffic attackView AnswerAnswer: D