- (Exam Topic 2)
Use the Ping command on the firewall to test the reachability to the server (the security zone where the server is located is the DMZ). If a security policy is configured to allow the test traffic, the source security zone is ______. [fill in the blank]*
Solution:
local
Does this meet the goal?
Correct Answer:
A
- (Exam Topic 1)
When A and B communicate with each other in data communication, if an asymmetric encryption algorithm is used for encryption, when A sends data to B, which of the following keys will be used for data encryption?
Correct Answer:
C
- (Exam Topic 1)
againstIPspoofing attack (IP Spoofing), which of the following is an error?
Correct Answer:
C
- (Exam Topic 2)
Which of the following statements is true about business continuity plans? (multiple choice)
Correct Answer:
BD
- (Exam Topic 2)
Control actions of firewall inter-domain forwarding security policypermitanddeny, which of the following options are correct? (multiple choice)
Correct Answer:
ABC