There are hundreds of people in a medium-sized enterprise network accessing the Internet through the company's firewall, and the company has deployed a corporate portal website in the firewall DMZ. Which of the following criteria should be followed as an IT security officer for purchasing and deploying Internet access auditing products?
There are hundreds of people in a medium-sized enterprise network accessing the Internet through the company's firewall, and the company has deployed a corporate portal website in the firewall DMZ. Which of the following criteria should be followed as an IT security officer for purchasing and deploying Internet access auditing...
Which of the following is a correct description of the stateful inspection firewall forwarding principle? (Multiple Choice)
Which of the following is a correct description of the stateful inspection firewall forwarding principle? (Multiple Choice)A . The non-first packet forwarding is based on the session table, which can only be forwarded if it matches the session table. B. ICMP packets do not perform stateful inspection. C. Establish a...
What are the implementation mechanisms of intrusion prevention? (Multiple Choice)
What are the implementation mechanisms of intrusion prevention? (Multiple Choice)A . Blacklist matching B. Protocol Identification and Protocol Resolution C. Feature matching D. Response handlingView AnswerAnswer: BCD
Which of the following applications cannot be secured using packet filtering alone? (Multiple Choice)
Which of the following applications cannot be secured using packet filtering alone? (Multiple Choice)A . WWW service B. Telnet Service C. FTP service D. H.323View AnswerAnswer: CD