When creating RAID, which of the following statement is incorrect?

When creating RAID, which of the following statement is incorrect?
A . RAID0 is suitable for high reading and writing requirements, and data has no security requirements.
B . RAID1 is suitable for the case of data security requirements first
C . RAID5 is suitable for a large number of small IO switching frequently operation situations
D . RAID6 applies to situations where data security requirements are high

Answer: C

When configuring the security level of the firewall security zone, which of the following statement is wrong?

When configuring the security level of the firewall security zone, which of the following statement is wrong?
A . The security level of the newly created security zone is 1 by default.
B . You can only set security levels for custom security zones
C . Security level is not allowed to change once set
D . Two security domains in the same system are not allowed to configure the same security level

Answer: A

In server virtualization, virtual machines running on the same physical computer do not affect the running status of other virtual machines when one of them crashes or modifies. What feature does this represent for virtualization?

In server virtualization, virtual machines running on the same physical computer do not affect the running status of other virtual machines when one of them crashes or modifies. What feature does this represent for virtualization?
A . Isolation
B . Compatibility
C . Hardware-independent
D . Unity

Answer: A

Which of the following statement about the description of VPC is incorrect?

Which of the following statement about the description of VPC is incorrect?
A . You can define your own private subnet in the VPC and deploy the application and other services under the corresponding subnet as needed.
B . You can use the security group function to divide the Elastic Cloud Server in the VPC into different security domains and define different access control rules for each security domain.
C . You can apply for an independent public IP address, bind to the elastic cloud server freely and flexibly and take effect immediately.
D . VPC is a separate area that cannot be interconnected with traditional data centers.

Answer: D

The attacker intercepts and records the data from A to B, and then extracts the information from the data intercepted earlier to B, what is the process called?

The attacker intercepts and records the data from A to B, and then extracts the information from the data intercepted earlier to B, what is the process called?
A . Man-in-the-middle attack
B . Password guesser and dictionary attack
C . Reflection attack
D . Replay attack

Answer: D