All of the following are examples of malicious code except:
A. viruses.
B. bots.
C. worms.
D. sniffers.
查看答案
According to where detection takes place, intrusion detection systems can be divided into ________.
Anomaly IDS and host IDS
B. Anomaly IDS and misuse IDS
C. Anomaly IDS and network IDS
D. Host-based IDS and network IDS
The correct statement about firewall security is ________.
A. "Everything that is not prohibited is allowed" High security
B. "Everything that is not allowed is prohibited" Low security
C. "Everything that is not prohibited is allowed" High flexibility
D. "Everything that is not allowed is prohibited" High convenience
The incorrect statement about the firewall is ________.
A. The firewall is placed between the internal network and the external network
B. Firewalls can prevent the entry of viruses
C. The firewall is a collection of software and hardware
D. Firewalls can prevent illegal users from accessing internal networks
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
A. firewall
B. virtual private network
C. proxy server
D. PPTP