________ link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.
Access VPN
B. Intranet VPN
C. Extranet VPN
D. Internet VPN
查看答案
A ________ is a service that allows you to connect to the Internet via an encrypted tunnel to ensure your online privacy and protect your sensitive data.
A. VPN.
B. firewall.
C. IDS.
D. Intranet.
All of the following are examples of malicious code except:
A. viruses.
B. bots.
C. worms.
D. sniffers.
According to where detection takes place, intrusion detection systems can be divided into ________.
Anomaly IDS and host IDS
B. Anomaly IDS and misuse IDS
C. Anomaly IDS and network IDS
D. Host-based IDS and network IDS
The correct statement about firewall security is ________.
A. "Everything that is not prohibited is allowed" High security
B. "Everything that is not allowed is prohibited" Low security
C. "Everything that is not prohibited is allowed" High flexibility
D. "Everything that is not allowed is prohibited" High convenience