In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*
Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities
Which of the following is not included in the Business Impact Analysis (BIA).
During the process of establishing IPSec VPN between peers FW_A and FW_B, two types of security associations need to be established in two stages. In the first stage, _____ is established to verify the identity of the peers.[fill in the blank]*
The following description of the intrusion fire protection system IPS, which is correct?
As shown in the figure, nat server global202.106.1.1 inside10.10.1.1 is configured on the firewall. Which of the following is the correct configuration for interzone rules? ( )[Multiple choice]*
When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.
The shard cache technology will wait for the arrival of the first shard packet, and then reassemble and decrypt all the packets, and then do subsequent processing by the device to ensure that the session can proceed normally in some application scenarios.
According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
The following description of the construction of a digital certificate, which item is wrong
Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver ( )[Multiple choice]*
Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*
Which of the following zones is not the firewall default security zone?