Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In most cases, a user applies for a local certificate from a CA, and the CA approves the application and issues the certificate to the user.

A.

TRUE

B.

FALSE

Which of the following statements is correct about characteristics of a firewall?

A.

The firewall is a comprehensive security device with multiple security features to defend against zero-day vulnerabilities.

B.

The firewall can prevent unauthorized information on the extranet from being sent to the intranet.

C.

The firewall can defend against all external network threats.

D.

The firewall has the antivirus function. Therefore, the antivirus system does not need to be deployed on the network where the firewall is deployed.

What are the correct entries in the following description of firewall security zones?

A.

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.

B.

The Local zone is the highest security zone with a priority of 99.

C.

Data flows between security domains are directional, including Inbound and Outbound.

D.

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.

The following description of digital certificates, which one is wrong

A.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

B.

Digital certificates contain the owner's public key and related identity information.

C.

In general, the key of a digital certificate has an expiration date.

D.

Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner.

The following description of asymmetric encryption algorithms, which item is wrong?

A.

Compared with symmetric encryption algorithms, the security factor is higher.

B.

Encryption is faster than symmetric encryption algorithms.

C.

Public keys are generally disclosed to users.

D.

Asymmetric encryption algorithms are a pair of keys, divided into public and private keys.

An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*

A.

Time synchronization server

B.

FTP server (I)

C.

DNS server

D.

Mail server

What is correct in the following description of Security Alliance in IPSec?

There are two ways to set up an IPSec SA

A.

manual and IKE.

IPSec SA is uniquely identified by a triple.

B.

IPSec SA is a one-way logical connection, usually established in pairs (Inbound and Outbound).

C.

Security Alliance SA is a communication peer agreement for certain elements that describes how peers can communicate securely using secure services such as encryption.

Match the following single-packet attack types with their corresponding descriptions.

Information security aims to protect data in hardware, software, and their systems on information networks to prevent data damage, tampering, or breach due to occasional or malicious reasons and ensure proper system running and non-stop information services.

A.

TRUE

B.

FALSE

Which of the following statements are incorrect about the differences between routers and Layer 2 switches?

A.

By default, routers can isolate broadcast domains but not collision domains.

B.

Switches flood broadcast packets.

C.

Routers forward broadcast packets.

D.

By default, switches can isolate collision domains but not broadcast domains.