In o der to obtain evidence of crime, it is necessary to master the technology ofintrusion tracking Which of the following descriptions are correct about the tracking technology? (Multiple Choice)
Correct Answer:
ABD
Which types of encryption technology can be divided into? (Multiple Choice)
Correct Answer:
AB
Manual auditing is asupplement to tool evaluation. It does not require any software to be installed on the target system being evaluated, and has no effect on the operation and status of the target system. Which of the following options does not include manual auditing?
Correct Answer:
D
Except built-in Portal authentication, firewall also supports custom Portal authentication, when using a custom Portalauthentication, no need to deploy a separate external Portal sever.
Correct Answer:
B
The Huawei Redundancy Protocol (HRP) is used to synchronize the main firewall configuration and connection status and other data on the backup firewall to synchronize . Whichof the following options is not in the scope of synchronization?
Correct Answer:
D