Question 161
Which of the following options is correct for the description of the rating of the level protection system in the
2.0 class protection system?
2.0 class protection system?
Question 162
In the TCP/IP protocol core, which of the following protocols works at the application layer?
Question 163
Digital certificates can be divided into local certificates, CA certificates, root certificates, and self-signed certificates depending on the use scenario.
Question 164
Regarding the comparison between windows and linux, which of the following statements is wrong?
Question 165
Please match the following information security risks to information security incidents one by one.[fill in the blank]* physical security riskEnterprise server permissions are loosely set Information Security Management RiskInfected Panda Burning Incense Information Access RiskFire destroyed equipment in computer room application riskTalk to people about leaking company secrets