What is the port number of the SMTP protocol?

What is the port number of the SMTP protocol?A . 25B . 30C . 109D . 32View AnswerAnswer: A

November 14, 2023 No Comments READ MORE +

If there is an incident of foreign criminals using the Internet to steal our country’s national secrets, what kind of early warning will the country activate?

If there is an incident of foreign criminals using the Internet to steal our country’s national secrets, what kind of early warning will the country activate?A . Orange AlertB . Yellow AlertC . Blue AlertD . Red AlertView AnswerAnswer: A

November 14, 2023 No Comments READ MORE +

Usually we divide servers into two categories: general servers and functional servers. Which of the following options meets this classification standard?

Usually we divide servers into two categories: general servers and functional servers. Which of the following options meets this classification standard?A . Divided by application levelB . Classification by purposeC . Divide by appearanceD . Divided by architectureView AnswerAnswer: B

November 13, 2023 No Comments READ MORE +

Which of the following does not include the steps of the security assessment method?

Which of the following does not include the steps of the security assessment method?A . Manual auditB . Penetration testingC . Questionnaire surveyD . Data analysisView AnswerAnswer: D

November 13, 2023 No Comments READ MORE +

In inter-domain packet filtering, which of the following applies to the Inboud direction?

In inter-domain packet filtering, which of the following applies to the Inboud direction?A . Untrust>TrustB . Local>TrustC . DME>UntrustD . Local>DNZView AnswerAnswer: A

November 13, 2023 No Comments READ MORE +

Which of the following is not the default security zone of the firewall?

Which of the following is not the default security zone of the firewall?A . Untrust ZoneB . DMZ ZoneC . Trust ZoneD . ISP ZoneView AnswerAnswer: D

November 13, 2023 No Comments READ MORE +

Which of the following technologies can hide the internal network of a private network while preventing external attacks on internal servers?

Which of the following technologies can hide the internal network of a private network while preventing external attacks on internal servers?A . IP spoofingB . NAT _C . VRRPD . Address filteringView AnswerAnswer: B

November 12, 2023 No Comments READ MORE +

What kind of attack does this behavior belong to?

The attacker sends a SYN message with the same source address and destination address, or the source address is a loopback address, to the target host (the source port and destination port are the same), causing the attacker to send a SYN-ACK message to its own address. What kind of...

November 12, 2023 No Comments READ MORE +

Regarding IKE SA, which of the following descriptions is incorrect?

Regarding IKE SA, which of the following descriptions is incorrect? A. IKE SA is two-way B. IKE is an application layer protocol based on UDP C. IKE SA serves IPsec SA D. The encryption algorithm used in user data packets is determined by IKE SA.View AnswerAnswer: D

November 12, 2023 No Comments READ MORE +

Which of the following descriptions of HWTACACS protocol features is incorrect?

Which of the following descriptions of HWTACACS protocol features is incorrect?A . Use UDP protocolB . Separation of authentication and authorizationC . In addition to the standard HWTACACS message header, the entire message body is encrypted.D . Suitable for security control.View AnswerAnswer: A

November 12, 2023 No Comments READ MORE +