Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?

Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?A . Hold a summary meeting of the project in the information security management stage B. Determine risk disposal measures and implement rectification plans C. Determine risk...

December 28, 2022 No Comments READ MORE +

Which of the following is not an advantage of symmetric encryption algorithms?

Which of the following is not an advantage of symmetric encryption algorithms?A . Suitable for encrypting large amounts of data B. Low overhead C. Good scalability D. High efficiencyView AnswerAnswer: C

December 28, 2022 No Comments READ MORE +

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode? A . The4 B. The3 C. The2 D. The1View AnswerAnswer: A

December 28, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user [fill in the blank]View...

December 28, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE

December 28, 2022 No Comments READ MORE +

Which of the following descriptions of single sign-on is correct?

Which of the following descriptions of single sign-on is correct?A . The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party...

December 26, 2022 No Comments READ MORE +

The initial priority of the USG9500VGMP group is related to which of the following factors ()?

The initial priority of the USG9500VGMP group is related to which of the following factors ()?A . interface bandwidth B. VRRP priority C. Number of daughter cards on the interface board D. The number of CPUs on the D service boardView AnswerAnswer: C,D

December 26, 2022 No Comments READ MORE +

The following description of the intrusion fire protection system IPS, which is correct?

The following description of the intrusion fire protection system IPS, which is correct?A . The port IPS can be concatenated at the network boundary. B. The IPS cannot prevent intrusion from occurring in real time. C. The port IPS can be attached to the switch and port mirrored through the...

December 26, 2022 No Comments READ MORE +

verify [fill in the blank] *

verify [fill in the blank] *View AnswerAnswer: 1243

December 24, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed. [fill in the blank]View AnswerAnswer: symmetry

December 24, 2022 No Comments READ MORE +