Which of the following protocols can guarantee the confidentiality of data transmission? (Multiple Choice)
Which of the following protocols can guarantee the confidentiality of data transmission? (Multiple Choice)A . TelnetB . SSHC . FTPD . HTTPSView AnswerAnswer: BD
Which of the following is the correct description of the investigation and evidence collection?
Which of the following is the correct description of the investigation and evidence collection?A . Evidence is not necessarily required during the investigationB . Evidence obtained by eavesdropping is also validC . In the process of all investigation and evidence collection, there are law enforcement agencies involved.D . Document evidence...
Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?
Both the GE1/0/1 and GE1/0/2 ports of the firewall belong to the DMZ. If the area connected to GE1/0/1 can access the area connected to GE1/0/2, which of the following is correct?A . Need to configure the security policy from Local to DMZB . No need to do any configurationC . Need to configure an interzone security policyD . Need to configure security policy from DMZ to local View...
Which configuration is correct to implement NAT ALG function?
Which configuration is correct to implement NAT ALG function?A . nat alg protocolB . alg protocolC . nat protocolD . detect protocolView AnswerAnswer: D
Which of the following are parts of the PKI architecture? (Multiple Choice)
Which of the following are parts of the PKI architecture? (Multiple Choice)A . End entityB . Certification AuthorityC . Certificate Registration AuthorityD . Certificate Storage organizationView AnswerAnswer: ABCD
Which of the following does not belong to the user authentication method in the USG firewall?
Which of the following does not belong to the user authentication method in the USG firewall?A . Free certificationB . Password authenticationC . Single sign-onD . Fingerprint authenticationView AnswerAnswer: D
Digital certificates can be divided into local certificates, CA certificates, root certificates, and self-signed certificates according to different usage scenarios.
Digital certificates can be divided into local certificates, CA certificates, root certificates, and self-signed certificates according to different usage scenarios.A . TrueB . FalseView AnswerAnswer: A
Which of the following is the core part of the P2DR model?
Which of the following is the core part of the P2DR model?A . Policy StrategyB . ProtectionC . DetectionD . ResponseView AnswerAnswer: A
In the Client-Initiated VPN configuration, generally it is recommended to plan the address pool and the headquarters of the network address for the different network segments, or need to open proxy forwarding on the gateway device.
In the Client-Initiated VPN configuration, generally it is recommended to plan the address pool and the headquarters of the network address for the different network segments, or need to open proxy forwarding on the gateway device.A . TrueB . FalseView AnswerAnswer: A