Question 156
Which of the following statements about firewalls is correct?
Question 157
Ways to use a computer to store information about criminal activity that is not a computer crime
Question 158
Which of the following is an encryption technique used in digital envelopes?
Question 159
In the classification of the information security level protection system, which of the following levels defines if the information system is damaged, it will damage the social order and public interests? (Multiple choice)
Question 160
Which of the following descriptions of the firewall log is wrong?