题目内容

According to where detection takes place, intrusion detection systems can be divided into ________.

Anomaly IDS and host IDS
B. Anomaly IDS and misuse IDS
C. Anomaly IDS and network IDS
D. Host-based IDS and network IDS

查看答案
更多问题

The correct statement about firewall security is ________.

A. "Everything that is not prohibited is allowed" High security
B. "Everything that is not allowed is prohibited" Low security
C. "Everything that is not prohibited is allowed" High flexibility
D. "Everything that is not allowed is prohibited" High convenience

The incorrect statement about the firewall is ________.

A. The firewall is placed between the internal network and the external network
B. Firewalls can prevent the entry of viruses
C. The firewall is a collection of software and hardware
D. Firewalls can prevent illegal users from accessing internal networks

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.

A. firewall
B. virtual private network
C. proxy server
D. PPTP

________ refers to the ability to ensure that an e-commerce site continues to function as intended.

A. Nonrepudiation
B. Authenticity
C. Availability
D. Integrity

答案查题题库