题目内容

________ link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.

Access VPN
B. Intranet VPN
C. Extranet VPN
D. Internet VPN

查看答案
更多问题

A ________ is a service that allows you to connect to the Internet via an encrypted tunnel to ensure your online privacy and protect your sensitive data.

A. VPN.
B. firewall.
C. IDS.
D. Intranet.

All of the following are examples of malicious code except:

A. viruses.
B. bots.
C. worms.
D. sniffers.

According to where detection takes place, intrusion detection systems can be divided into ________.

Anomaly IDS and host IDS
B. Anomaly IDS and misuse IDS
C. Anomaly IDS and network IDS
D. Host-based IDS and network IDS

The correct statement about firewall security is ________.

A. "Everything that is not prohibited is allowed" High security
B. "Everything that is not allowed is prohibited" Low security
C. "Everything that is not prohibited is allowed" High flexibility
D. "Everything that is not allowed is prohibited" High convenience

答案查题题库