Which of the following is not a quintuple range?
A . Source IP
B . Source Mac
C . Destination IP
D . Destination port
Answer: B
Which of the following is not a quintuple range?
A . Source IP
B . Source Mac
C . Destination IP
D . Destination port
Answer: B
In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.
A . True
B . False
Answer: B
Which of the following is not used by the Detection link in the P2DR model?
A . Real-time monitoring
B . Detection
C . Alarm
D . Close service
Answer: D
Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?
A . Relevance standard refers to that if the electronic evidence can have a material impact on the facts of the case to a certain extent, the court should rule that it is relevant.
B . Objective standard refers to the acquisition, storage, and submission of electronic evidences shall be legal, and the basic rights such as national interests, social welfare and personal privacy do not constitute strict violations.
C . Legality standard is to ensure that electronic evidence is collected from the initial acquisition, and the content is not changed in the process of submission as litigation evidence.
D . Fair standard refers to that only the legal subject obtains the evidentiary material by legal means has evidentiary ability.
Answer: A
In some scenarios, it is necessary to convert the source IP address, but also convert the destination IP address, which technology of the following is used by these scenarios?
A . Two-way NAT
B . Source Nat
C . NAT-Server
D . Nat Alg
Answer: A
About the description of the vulnerability scan, which of the following is wrong?
A . Vulnerability Scan is a technology based on network remote monitoring target network or host security performance vulnerability, which can be used to simulate attack experiments and security audits.
B . Vulnerability scan is used to detect if the target host system has a vulnerability, generally a scan for a specific vulnerability for the target host
C . Vulnerability scan is a passive prevention measures to effectively avoid hacker attack behavior
D . Vulnerability scan can be used according to the results of ping scanning and port scanning
Answer: C
Data Analysis Technology is to find, match keywords or key phrases, and analyze the correlation of time in data streams or information streams that have been obtained.
Which of the following does not belong to evidence analysis technology?
A . Password decipherment, data decryption technology
B . File Digital Summary Analysis Technology
C . Exploring the technology of the connection between different evidence
D . Spam tracking technology
Answer: D
When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?
A . Administrators can announce the content log to view the detection and defense record of network threats
B . Administrators can understand the user’s security risk behavior and the cause of the alarm or blocking reason via threat logs.
C . Administrators know the user’s behavior, the keyword of the exploitation, and the effectiveness of the audit policy configuration through user activity logs.
D . Administrators can use the security policy in which traffic hits in the policy, for fault location when there is a problem.
Answer: D
About SSL VPN technology, which of the following statement is wrong?
A . SSL VPN technology is perfect for NAT traversal scenarios
B . Encryption of SSL VPN technology only takes effect on the application layer
C . SSL VPN requires dial client
D . SSL VPN technology expands the network range of enterprises
Answer: C
In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.
A . True
B . False
Answer: B