- (Exam Topic 1)
"observant"and"remain skeptical"Can help us better identify security threats in the online world
Correct Answer:A
- (Exam Topic 1)
Which of the following options are correct regarding the description of Windows log event types? (multiple choice)
Correct Answer:BD
- (Exam Topic 3)
Database operation records can be used as ______ evidence to backtrack security events.[fill in the blank]*
Solution:
electronic
Does this meet the goal?
Correct Answer:A
- (Exam Topic 1)
Regarding the description of vulnerability scanning, which of the following is false?
Correct Answer:C
- (Exam Topic 2)
IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data
Correct Answer:B
- (Exam Topic 2)
Social engineering is a means of harm such as deception, harm, etc., through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims.
Correct Answer:A