Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)

Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)A . Restore defaultB . Change Notification RulesC . Set connection safety rulesD . Set inbound and outbound rulesView AnswerAnswer: CD

September 25, 2021 No Comments READ MORE +

Which items are the encryption techniques used by digital envelopes? (Multiple Choice)

Which items are the encryption techniques used by digital envelopes? (Multiple Choice)A . Symmetrical encryption algorithmB . Asymmetric encryption algorithmC . Hash algorithmD . Flow encryption algorithmView AnswerAnswer: AB

September 23, 2021 No Comments READ MORE +

Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)

Which one of the options below belong to the component of the PKI architecture? (Multiple Choice)A . Terminal entityB . Certificate certification authorityC . Certificate registration authorityD . Certificate Storage authorityView AnswerAnswer: ABCD

September 23, 2021 No Comments READ MORE +

"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.

"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.A . TrueB . FalseView AnswerAnswer: A

September 22, 2021 No Comments READ MORE +

Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)

Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)A . Conference tableB . ServerMap entryC . Dynamic blacklistD . Routing tableView AnswerAnswer: ABC

September 22, 2021 No Comments READ MORE +

About the description of the vulnerability scan, which of the following is wrong?

About the description of the vulnerability scan, which of the following is wrong?A . Vulnerability Scan is a technology based on network remote monitoring target network or host security performance vulnerability, which can be used to simulate attack experiments and security audits.B . Vulnerability scan is used to detect if...

September 21, 2021 No Comments READ MORE +

Which of the following is the core part of the P2DR model?

Which of the following is the core part of the P2DR model?A . PolicyB . ProtectionC . DetectionD . ResponseView AnswerAnswer: A

September 21, 2021 No Comments READ MORE +

When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?

When configuring NAT Server on the USG Series Firewall, a Server-Map table is generated. Which item below does not belong to content in this performance?A . Destination IPB . Destination port numberC . Agreement numberD . Source IPView AnswerAnswer: D

September 20, 2021 No Comments READ MORE +

Regarding the online user management, which of the following is incorrect?

Regarding the online user management, which of the following is incorrect?A . Each user group can include multiple users and user groupsB . Each user group can belong to multiple parent user groupsC . The system has a default user group by default, and it is also the system default...

September 20, 2021 No Comments READ MORE +

Which of the following is not a quintuple range?

Which of the following is not a quintuple range?A . Source IPB . Source MacC . Destination IPD . Destination portView AnswerAnswer: B

September 20, 2021 No Comments READ MORE +