Question 51
Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)
Question 52
Regarding the online user management, which of the following is incorrect?
Question 53
Clients in the Trust zone of the firewall can log in to the FTP server in the Untrust zone, but cannot download files. Which of the following methods can solve the problem? (Multiple Choice)
Question 54
Please match the following information security risks with information security incidents one by one.


Question 55
About the description of the vulnerability scan, which of the following is wrong?