Question 56
Which is the order of the four stages of the Information Security Management System (ISMS) in the following options?
Question 57
Match the following survey methods and descriptions one by one


Question 58
The most common three-level standard for equal protection includes three aspects: physical security, data security and network security.
Question 59
The attacker sendsICMPAnswer the request and set the destination address of the request packet as the broadcast address of the victim network. What kind of attack is this behavior?
Question 60
Which of the following options can be operated in the advanced settings of the windows firewall? (Multiple choice)