Which item below is not a Linux operating system?
Which item below is not a Linux operating system?A . CentOSB . RedHatC . UbuntuD . MAC OSView AnswerAnswer: D
NAPT technology can implement a public IP address for multiple private network hosts.
NAPT technology can implement a public IP address for multiple private network hosts.A . TrueB . FalseView AnswerAnswer: A
DDoS attack belongs to which attack type?
DDoS attack belongs to which attack type?A . Snoop scan attackB . Malformed packet attackC . Special packet attackD . Flow type attackView AnswerAnswer: D
"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?
"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?A . ConfidentialityB . ControllabilityC . Non-repudiationD . IntegrityView AnswerAnswer: B
Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)
Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)A . TelnetB . SSHC . FTPD . HTTPSView AnswerAnswer: BD
Which of the following is the core part of the P2DR model?
Which of the following is the core part of the P2DR model?A . PolicyB . ProtectionC . DetectionD . ResponseView AnswerAnswer: A
Regarding the online user management, which of the following is incorrect?
Regarding the online user management, which of the following is incorrect?A . Each user group can include multiple users and user groupsB . Each user group can belong to multiple parent user groupsC . The system has a default user group by default, and it is also the system default...
Regarding the firewall security strategy, which of the following is wrong?
Regarding the firewall security strategy, which of the following is wrong?A . If the security policy is Permit, the discarded message will not be accumulated "hitting"B . When configuring the security policy name, you cannot reuse the same name.C . Adjust the order of the security policy, do not need...
Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)
Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)A . Terminal entityB . Certificate certification authorityC . Certificate registration authorityD . Certificate Storage authorityView AnswerAnswer: ABCD
Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)
Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)A . Restore defaultB . Change Notification RulesC . Set connection safety rulesD . Set inbound and outbound rulesView AnswerAnswer: CD