When the firewall hard disk is in place, which of the following is correct description for the firewall log?

When the firewall hard disk is in place, which of the following is correct description for the firewall log?A . The administrator can advertise the content log to view the detection and defense records of network threats.B . The administrator can use the threat log to understand the user’s security risk behavior and the reason for...

Continue reading

Regarding the description of the vulnerability scanning, which of the following is wrong?

Regarding the description of the vulnerability scanning, which of the following is wrong?A .  Vulnerability scanning is a technology based on network remote monitoring of target network or host security performance vulnerability, which can be used for simulated attack experiments and security audits.B .  Vulnerability scanning is used to detect whether there is a...

Continue reading