Which of the following description are correct about the security policy action and security configuration file? (Multiple Choice)
Correct Answer:
AC
Electronic evidence preservation is directly related to the legal effect of evidence, in line with the preservation of legal procedures, and its authenticity and reliability are guaranteed. Which of the following is not anevidence preservation technology?
Correct Answer:
D
Which of the following attacks is not a cyber-attack?
Correct Answer:
C
The host firewall is mainly used to protect the host from attacks and intrusions from the network
Correct Answer:
A
Which of the following options can be used in the advanced settings of windows firewall? (Multiple Choices)
Correct Answer:
ABCD