- (Exam Topic 2)
Please order the following steps according to the graded protection process.[fill in the blank]
Solution:
grading, filing, testingComment,rectification, supervision)
Does this meet the goal?
Correct Answer:A
- (Exam Topic 2)
MACWhich of the following mechanisms are used by flood attacks? (multiple choice)
Correct Answer:ABCD
- (Exam Topic 2)
existUSGIn the series firewall system view, execute the commandreset saved-configurationAfter that, the device configuration will be restored to the default configuration, and it will take effect without any other operations.
Correct Answer:B
- (Exam Topic 2)
An employee of a company accesses the internal web server of the company through the firewall, and can open the web page of the website by using a browser, but the accessibility of the web server is tested by using the Pina command, and it shows that it is unreachable. What are the possible reasons? ( )[Multiple choice]
Correct Answer:A
- (Exam Topic 1)
"Implement security monitoring and management of information and information systems to prevent illegal use of information and information systems", in order to achieve which feature in information security?
Correct Answer:B
- (Exam Topic 3)
When a network security incident occurs, investigate the intrusion behavior, virus or Trojan horse, and repair and strengthen the host. Which of the above actions belong to the work content of the network security emergency response?
Correct Answer:D