Question 81
In the classification of the information security level protection system, which of the following levels defines if the information system is damaged, it will cause damage to social order and public interests?
Question 82
The company administrator uses the ping command to test the connectivity of the network. If he needs to specify the source address of the ehco-request message, what are the additional parameters he needs?
Question 83
_____ can view the direction of the traffic in the firewall.
Question 84
some applications such asOracleFor database applications, the firewall session connection is interrupted due to no data flow transmission for a long time, resulting in service interruption. Which of the following is the optimal solution?
Question 85
Please sort from large to small according to the table processing priority of iptables.[fill in the blank]*