Some applications such as Oracle Database Applications, has no data streaming for a long time, so that the firewall session connection is interrupted, resulting in business interruption, which of the following is the optimal solution?
Some applications such as Oracle Database Applications, has no data streaming for a long time, so that the firewall session connection is interrupted, resulting in business interruption, which of the following is the optimal solution?A . Configure a long connection for one businessB . Open the ASPF functionC . Optimize...
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.A . TrueB . FalseView AnswerAnswer: A
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.A . TrueB . FalseView AnswerAnswer: A
Regarding the investigation and evidence collection, which of the following statement is correct?
Regarding the investigation and evidence collection, which of the following statement is correct?A . Evidence is not necessarily needed in an investigationB . Evidence acquired by eavesdropping is also effectiveC . During all investigation and evidence, preferably with law enforcement involved.D . Document evidence is required in computer crimesView AnswerAnswer:...
Which of the following statement is wrong about the L2TP VPN of Client-Initialized?
Which of the following statement is wrong about the L2TP VPN of Client-Initialized?A . After the remote user access the Internet, the L2TP tunnel connection request can be initiated directly from the remote LNS through the client software.B . The LNS device receives the user's L2TP connection request, and the...
Which of the following is a remote authentication method? (Multiple Choice)
Which of the following is a remote authentication method? (Multiple Choice)A . RADIUSB . LocalC . HWTACACSD . LLDPView AnswerAnswer: AC
Which types of the following can the encryption technology be divided into? (Multiple Choice)
Which types of the following can the encryption technology be divided into? (Multiple Choice)A . Symmetrical encryptionB . Fractional symmetric encryptionC . Fingerprint encryptionD . Data encryptionView AnswerAnswer: AB
Which attack below does not belong to a special packet attack?
Which attack below does not belong to a special packet attack?A . ICMP redirection packet attackB . ICMP unreachable packet attackC . IP address scan attackD . Super ICMP Packet AttackView AnswerAnswer: C
Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)
Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)A . Warning event refers to an event that the application, driver or service is successful.B . Error events usually refer to the loss of functionality and data. For example, a service cannot be...
IPSec VPN technology does not support NAT crossing when using the ESP security protocol package, because ESP encrypts the header of the packet.
IPSec VPN technology does not support NAT crossing when using the ESP security protocol package, because ESP encrypts the header of the packet.A . TrueB . FalseView AnswerAnswer: B