Question 81

In the classification of the information security level protection system, which of the following levels defines if the information system is damaged, it will cause damage to social order and public interests?
  • Question 82

    The company administrator uses the ping command to test the connectivity of the network. If he needs to specify the source address of the ehco-request message, what are the additional parameters he needs?
  • Question 83

    _____ can view the direction of the traffic in the firewall.
  • Question 84

    some applications such asOracleFor database applications, the firewall session connection is interrupted due to no data flow transmission for a long time, resulting in service interruption. Which of the following is the optimal solution?
  • Question 85

    Please sort from large to small according to the table processing priority of iptables.[fill in the blank]*