Which of the following descriptions is wrong about the root CA certificate?
Which of the following descriptions is wrong about the root CA certificate? A. The issuer is CA B. The certificate subject name is CA. C. Public key information is the public key of the CA D. Signature is generated by CA public key encryptionView AnswerAnswer: D
Which of the following description is correct?
Check the firewall HRP status information as follows: HRP_S [USG_ B] display hrp state 16 : 90 : 13 2010/11/29 The firewall's config state is : SLAVE Current state of virtual routers configured as slave GigabitEthernet0/0/0 vird 1 : slave GigabitEthernet0/0/1 vied 2 : slave Which of the following description...
Regarding SSL VPN technology, which of the following options is wrong?
Regarding SSL VPN technology, which of the following options is wrong?A . SSL VPN technology can be perfectly applied to NAT traversal scenariosB . SSL VPN technology encryption only takes effect on the application layerC . SSL VPN requires a dial-up clientD . SSL VPN technology extends the network scope of the enterpriseView AnswerAnswer: C
Which of the following statements is wrong about the firewall gateway's anti-virus response to the HTTP protocol?
Which of the following statements is wrong about the firewall gateway's anti-virus response to the HTTP protocol?A . When the gateway device blocks the HTTP connection, push the web page to the client and generate a log.B . Response methods include announcement and blockingC . Alarm mode device only generates logs and sends them out without processing the files transmitted by...
Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?
Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?A . Need to configure the security policy from Local to DMZB . No need to do any configurationC . Need to configure an interzone security policyD . Need to configure security policy from DMZ to local View...
Which of the following attacks is not a malformed message attack?
Which of the following attacks is not a malformed message attack?A . Teardrop attackB . Smurf attackC . TCP fragment attackD . ICMP unreachable packet attackView AnswerAnswer: D
In the information security system construction management cycle, which of the following actions is required to be implemented in the “check” link?
In the information security system construction management cycle, which of the following actions is required to be implemented in the “check” link?A . Safety management system designB . Implementation of the safety management systemC . Risk assessmentD . Safety management system operation monitoringView AnswerAnswer: C
Which of the following is wrong about the management of Internet users?
Which of the following is wrong about the management of Internet users?A . Each user group can include multiple users and user groupsB . Each user group can belong to multiple user groupsC . The system has a default user group by default, which is also the system default authentication domain.D . Each user...
Which of the following is the encryption technology used by digital envelopes?
Which of the following is the encryption technology used by digital envelopes?A . Symmetric encryption algorithmB . Asymmetric encryption algorithmC . Hash algorithmD . Stream encryption algorithmView AnswerAnswer: B
Which of the following options is not the part of the quintet?
Which of the following options is not the part of the quintet?A . Source IPB . Source MACC . Destination IPD . Destination PortView AnswerAnswer: B