Question 161

Which of the following options is correct for the description of the rating of the level protection system in the
2.0 class protection system?
  • Question 162

    In the TCP/IP protocol core, which of the following protocols works at the application layer?
  • Question 163

    Digital certificates can be divided into local certificates, CA certificates, root certificates, and self-signed certificates depending on the use scenario.
  • Question 164

    Regarding the comparison between windows and linux, which of the following statements is wrong?
  • Question 165

    Please match the following information security risks to information security incidents one by one.[fill in the blank]* physical security riskEnterprise server permissions are loosely set Information Security Management RiskInfected Panda Burning Incense Information Access RiskFire destroyed equipment in computer room application riskTalk to people about leaking company secrets