Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The following description of digital certificates, which one is wrong

A.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

B.

Digital certificates contain the owner's public key and related identity information.

C.

In general, the key of a digital certificate has an expiration date.

D.

Digital certificates do not solve the problem of digital signature technology where the public key cannot be determined to be the designated owner.

Full Access
Question # 5

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Full Access
Question # 6

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

A.

Accept PC message mode

B.

Query the AD server security log mode

C.

Query the syslog server mode

D.

Firewall monitors AD authentication packets

Full Access
Question # 7

What are the correct entries in the following description of firewall security zones?

A.

The DMZ security zone solves the problem of server placement well, and this security area can place devices that need to provide network services to the outside world.

B.

The Local zone is the highest security zone with a priority of 99.

C.

Data flows between security domains are directional, including Inbound and Outbound.

D.

Normally, the two communicating parties must exchange messages, that is, there are messages transmitted in both directions between security domains.

Full Access
Question # 8

The following description of investigation and evidence collection, which one is correct

A.

Documentary evidence is required in computer crime.

B.

In all investigation and evidence collection, it is best to have law enforcement agencies involved.

C.

Evidence is not necessarily required in the course of the investigation.

D.

Evidence obtained by wiretapping is also valid.

Full Access
Question # 9

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*

Full Access
Question # 10

Using the ___ method of the Web proxy, the virtual gateway will encrypt the real URL that the user wants to access, and can adapt to different terminal types.[fill in the blank]*

Full Access
Question # 11

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

A.

TURE

B.

False

Full Access
Question # 12

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Full Access
Question # 13

As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

Full Access