Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

A.

According to the administrator configuration, the O&M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O&M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Which of the following is not an advantage of symmetric encryption algorithms?

A.

Suitable for encrypting large amounts of data

B.

Low overhead

C.

Good scalability

D.

High efficiency

As shown in the figure, what is the authentication range of the AH protocol in tunnel mode?

A.

The3

B.

The4

C.

The2

D.

The1

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

The trigger modes of the built-in Portal authentication in the firewall include pre-authentication and ____ authentication[fill in the blank]*

What is correct about the following description of device management in the operating system?

A.

The main task of port device management is to complete the I/O requests made by users and classify I/O devices for users.

B.

Whenever a process makes an I/O request to the system, as long as it is secure, the device allocator will assign the device to the process according to a certain policy.

C.

Device management can virtualize a physical device into multiple logical devices through virtualization technology, providing multiple user processes to use.

D.

In order to alleviate the problem of speed mismatch between CPU and I/O devices and improve the parallelism of CPU and I/O devices, in modern operating systems, almost all I/O devices are exchanging numbers with processors

Buffers are used at all times.

What is the security level of the Untrust zone in Huawei firewalls?

A.

10

B.

20

C.

5

D.

15