Which item below is not a Linux operating system?

Which item below is not a Linux operating system?A . CentOSB . RedHatC . UbuntuD . MAC OSView AnswerAnswer: D

May 15, 2022 No Comments READ MORE +

NAPT technology can implement a public IP address for multiple private network hosts.

NAPT technology can implement a public IP address for multiple private network hosts.A . TrueB . FalseView AnswerAnswer: A

May 14, 2022 No Comments READ MORE +

DDoS attack belongs to which attack type?

DDoS attack belongs to which attack type?A . Snoop scan attackB . Malformed packet attackC . Special packet attackD . Flow type attackView AnswerAnswer: D

May 14, 2022 No Comments READ MORE +

"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?

"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?A . ConfidentialityB . ControllabilityC . Non-repudiationD . IntegrityView AnswerAnswer: B

May 14, 2022 No Comments READ MORE +

Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)

Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)A . TelnetB . SSHC . FTPD . HTTPSView AnswerAnswer: BD

May 13, 2022 No Comments READ MORE +

Which of the following is the core part of the P2DR model?

Which of the following is the core part of the P2DR model?A . PolicyB . ProtectionC . DetectionD . ResponseView AnswerAnswer: A

May 12, 2022 No Comments READ MORE +

Regarding the online user management, which of the following is incorrect?

Regarding the online user management, which of the following is incorrect?A . Each user group can include multiple users and user groupsB . Each user group can belong to multiple parent user groupsC . The system has a default user group by default, and it is also the system default...

May 12, 2022 No Comments READ MORE +

Regarding the firewall security strategy, which of the following is wrong?

Regarding the firewall security strategy, which of the following is wrong?A . If the security policy is Permit, the discarded message will not be accumulated "hitting"B . When configuring the security policy name, you cannot reuse the same name.C . Adjust the order of the security policy, do not need...

May 12, 2022 No Comments READ MORE +

Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)

Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)A . Terminal entityB . Certificate certification authorityC . Certificate registration authorityD . Certificate Storage authorityView AnswerAnswer: ABCD

May 12, 2022 No Comments READ MORE +

Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)

Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)A . Restore defaultB . Change Notification RulesC . Set connection safety rulesD . Set inbound and outbound rulesView AnswerAnswer: CD

May 11, 2022 No Comments READ MORE +