Regarding the firewall security strategy, which of the following is wrong?

Regarding the firewall security strategy, which of the following is wrong?A . If the security policy is Permit, the discarded message will not be accumulated "hitting"B . When configuring the security policy name, you cannot reuse the same name.C . Adjust the order of the security policy, do not need...

October 2, 2021 No Comments READ MORE +

Which types of the following can the encryption technology be divided into? (Multiple Choice)

Which types of the following can the encryption technology be divided into? (Multiple Choice)A . Symmetrical encryptionB . Fractional symmetric encryptionC . Fingerprint encryptionD . Data encryptionView AnswerAnswer: AB

October 2, 2021 No Comments READ MORE +

NAPT technology can implement a public IP address for multiple private network hosts.

NAPT technology can implement a public IP address for multiple private network hosts.A . TrueB . FalseView AnswerAnswer: A

October 2, 2021 No Comments READ MORE +

Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)

Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)A . TelnetB . SSHC . FTPD . HTTPSView AnswerAnswer: BD

October 2, 2021 No Comments READ MORE +

Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)

Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)A . Warning event refers to an event that the application, driver or service is successful.B . Error events usually refer to the loss of functionality and data. For example, a service cannot be...

October 1, 2021 No Comments READ MORE +

Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?

Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?A . Relevance standard refers to that if the electronic evidence can have a material impact on...

October 1, 2021 No Comments READ MORE +

Which of the following statement is wrong about the L2TP VPN of Client-Initialized?

Which of the following statement is wrong about the L2TP VPN of Client-Initialized?A . After the remote user access the Internet, the L2TP tunnel connection request can be initiated directly from the remote LNS through the client software.B . The LNS device receives the user's L2TP connection request, and the...

September 30, 2021 No Comments READ MORE +

Which of the following is not used by the Detection link in the P2DR model?

Which of the following is not used by the Detection link in the P2DR model?A . Real-time monitoringB . DetectionC . AlarmD . Close serviceView AnswerAnswer: D

September 30, 2021 No Comments READ MORE +

Which item below is not a Linux operating system?

Which item below is not a Linux operating system?A . CentOSB . RedHatC . UbuntuD . MAC OSView AnswerAnswer: D

September 29, 2021 No Comments READ MORE +

"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?

"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?A . ConfidentialityB . ControllabilityC . Non-repudiationD . IntegrityView AnswerAnswer: B

September 29, 2021 No Comments READ MORE +