Which of the following is non-symmetric encryption algorithm?
Correct Answer:
D
Which of thefollowing 3re the versions of the SNMP protocol? (Multiple choice)
Correct Answer:
ACD
In the information security system construction management cycle, which of the following actions is required to be implemented in the "check' link?
Correct Answer:
C
About the descriptions of windows Firewall Advanced Settings, which of the following is wrong? (Multiple choice)
Correct Answer:
BD
Which of the following belongs to the devices at the execution layer in the Huawei SDSec solution? 'Multiple Choice)
Correct Answer:
BCD