- (Exam Topic 1)
Which of the following options is not included aboutHRP in the content of the master/slave configuration consistency check?
Correct Answer:C
- (Exam Topic 3)
Man-in-the-middle attacks are data security threats.
Correct Answer:A
- (Exam Topic 3)
The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)
Solution:
Penetration
Does this meet the goal?
Correct Answer:A
- (Exam Topic 2)
Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is ______. [fill in the blank]*
Solution:
local
Does this meet the goal?
Correct Answer:A
- (Exam Topic 1)
When the firewall upgrades the signature database and virus database online through the security service center, the firewall is required to be able to connect to the Internet first, and theDNSaddress
Correct Answer:A
- (Exam Topic 1)
Which of the following options is not part of the quintuple range?
Correct Answer:B