Among the various aspects of the risk assessment of IS027001, which of the following does not
belong to the system design and release process?
A
Which of the following types of malicious code on your computer includes?
A, B, C, D
For which of the following parameters can the packet filtering firewall filter?
B, D
What is the security level of the Untrust zone in Huawei firewalls?
C
Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?
D
What are the correct entries in the following description of firewall security zones?
A, C, D
Compared with the software architecture of C/S, B/S does not need to install a browser, and users are
more flexible and convenient to use.
A
What type of ACL does ACL number 3001 correspond to?
D
What is correct about the following description of device management in the operating system?
A, B, C, D
SSL VPN is a VPN technology that realizes remote secure access through SSL protocol. Which of the
following software must be installed when using SSL VPN?
C