In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.

In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.
A . True
B . False

Answer: B

Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?

Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?
A . Relevance standard refers to that if the electronic evidence can have a material impact on the facts of the case to a certain extent, the court should rule that it is relevant.
B . Objective standard refers to the acquisition, storage, and submission of electronic evidences shall be legal, and the basic rights such as national interests, social welfare and personal privacy do not constitute strict violations.
C . Legality standard is to ensure that electronic evidence is collected from the initial acquisition, and the content is not changed in the process of submission as litigation evidence.
D . Fair standard refers to that only the legal subject obtains the evidentiary material by legal means has evidentiary ability.

Answer: A

About the description of the vulnerability scan, which of the following is wrong?

About the description of the vulnerability scan, which of the following is wrong?
A . Vulnerability Scan is a technology based on network remote monitoring target network or host security performance vulnerability, which can be used to simulate attack experiments and security audits.
B . Vulnerability scan is used to detect if the target host system has a vulnerability, generally a scan for a specific vulnerability for the target host
C . Vulnerability scan is a passive prevention measures to effectively avoid hacker attack behavior
D . Vulnerability scan can be used according to the results of ping scanning and port scanning

Answer: C

Which of the following does not belong to evidence analysis technology?

Data Analysis Technology is to find, match keywords or key phrases, and analyze the correlation of time in data streams or information streams that have been obtained.

Which of the following does not belong to evidence analysis technology?
A . Password decipherment, data decryption technology
B . File Digital Summary Analysis Technology
C . Exploring the technology of the connection between different evidence
D . Spam tracking technology

Answer: D

When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?

When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?
A . Administrators can announce the content log to view the detection and defense record of network threats
B . Administrators can understand the user’s security risk behavior and the cause of the alarm or blocking reason via threat logs.
C . Administrators know the user’s behavior, the keyword of the exploitation, and the effectiveness of the audit policy configuration through user activity logs.
D . Administrators can use the security policy in which traffic hits in the policy, for fault location when there is a problem.

Answer: D

In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.

In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.
A . True
B . False

Answer: B