Question 156

Which of the following statements about firewalls is correct?
  • Question 157

    Ways to use a computer to store information about criminal activity that is not a computer crime
  • Question 158

    Which of the following is an encryption technique used in digital envelopes?
  • Question 159

    In the classification of the information security level protection system, which of the following levels defines if the information system is damaged, it will damage the social order and public interests? (Multiple choice)
  • Question 160

    Which of the following descriptions of the firewall log is wrong?