Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)
Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)A . Restore defaultB . Change Notification RulesC . Set connection safety rulesD . Set inbound and outbound rulesView AnswerAnswer: CD
Which items are the encryption techniques used by digital envelopes? (Multiple Choice)
Which items are the encryption techniques used by digital envelopes? (Multiple Choice)A . Symmetrical encryption algorithmB . Asymmetric encryption algorithmC . Hash algorithmD . Flow encryption algorithmView AnswerAnswer: AB
Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)
Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)A . Terminal entityB . Certificate certification authorityC . Certificate registration authorityD . Certificate Storage authorityView AnswerAnswer: ABCD
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.A . TrueB . FalseView AnswerAnswer: A
Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)
Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)A . Conference tableB . ServerMap entryC . Dynamic blacklistD . Routing tableView AnswerAnswer: ABC
About the description of the vulnerability scan, which of the following is wrong?
About the description of the vulnerability scan, which of the following is wrong?A . Vulnerability Scan is a technology based on network remote monitoring target network or host security performance vulnerability, which can be used to simulate attack experiments and security audits.B . Vulnerability scan is used to detect if...
Which of the following is the core part of the P2DR model?
Which of the following is the core part of the P2DR model?A . PolicyB . ProtectionC . DetectionD . ResponseView AnswerAnswer: A
When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?
When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?A . Destination IPB . Destination port numberC . Agreement numberD . Source IPView AnswerAnswer: D
Regarding the online user management, which of the following is incorrect?
Regarding the online user management, which of the following is incorrect?A . Each user group can include multiple users and user groupsB . Each user group can belong to multiple parent user groupsC . The system has a default user group by default, and it is also the system default...
Which of the following is not a quintuple range?
Which of the following is not a quintuple range?A . Source IPB . Source MacC . Destination IPD . Destination portView AnswerAnswer: B