Which of the following does not belong to evidence analysis technology?

Data Analysis Technology is to find, match keywords or key phrases, and analyze the correlation of time in data streams or information streams that have been obtained. Which of the following does not belong to evidence analysis technology?A . Password decipherment, data decryption technologyB . File Digital Summary Analysis TechnologyC...

September 28, 2021 No Comments READ MORE +

When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?

When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?A . Administrators can announce the content log to view the detection and defense record of network threatsB . Administrators can understand the user's security risk behavior and the cause of...

September 28, 2021 No Comments READ MORE +

"Caesar Password" is mainly encrypted by using a stick of specific specifications.

"Caesar Password" is mainly encrypted by using a stick of specific specifications.A . TrueB . FalseView AnswerAnswer: B

September 28, 2021 No Comments READ MORE +

Regarding the investigation and evidence collection, which of the following statement is correct?

Regarding the investigation and evidence collection, which of the following statement is correct?A . Evidence is not necessarily needed in an investigationB . Evidence acquired by eavesdropping is also effectiveC . During all investigation and evidence, preferably with law enforcement involved.D . Document evidence is required in computer crimesView AnswerAnswer:...

September 27, 2021 No Comments READ MORE +

In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.

In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.A . TrueB . FalseView AnswerAnswer: B

September 27, 2021 No Comments READ MORE +

IPSec VPN technology does not support NAT crossing when using the ESP security protocol package, because ESP encrypts the header of the packet.

IPSec VPN technology does not support NAT crossing when using the ESP security protocol package, because ESP encrypts the header of the packet.A . TrueB . FalseView AnswerAnswer: B

September 26, 2021 No Comments READ MORE +

What protection levels are included in TCSEC standard? (Multiple Choice)

What protection levels are included in TCSEC standard? (Multiple Choice)A . Verification ProtectionB . Forced ProtectionC . Self-protectionD . Passive ProtectionView AnswerAnswer: ABC

September 26, 2021 No Comments READ MORE +

Which attack below does not belong to a special packet attack?

Which attack below does not belong to a special packet attack?A . ICMP redirection packet attackB . ICMP unreachable packet attackC . IP address scan attackD . Super ICMP Packet AttackView AnswerAnswer: C

September 26, 2021 No Comments READ MORE +

In some scenarios, it is necessary to convert the source IP address, but also convert the destination IP address, which technology of the following is used by these scenarios?

In some scenarios, it is necessary to convert the source IP address, but also convert the destination IP address, which technology of the following is used by these scenarios?A . Two-way NATB . Source NatC . NAT-ServerD . Nat AlgView AnswerAnswer: A

September 26, 2021 No Comments READ MORE +

About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)

About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)A . AH can provide the functions of encryption and verificationB . ESP can provide the functions of encryption and verificationC . AH's protocol number is 51D . ESP's protocol number is 51View AnswerAnswer: BC

September 25, 2021 No Comments READ MORE +