Question 16
Regarding the NAT policy processing, which of the following are correct? (Multiple choice)
Question 17
After the firewall detects an intrusion, the administrator can view the intrusion log information in the firewall business log or ( ) log. (fill in the blank)
Question 18
About SSL VPN technology, which of the following statement is wrong?
Question 19
Which of the following areFTPThe standard port number of the protocol? (multiple choice)
Question 20
After a network intrusion event occurs, the identity of the intrusion, the source of the attack and other information are obtained according to the plan, and the intrusion behavior is blocked. The above actions belong to PDRR. What are the links in the network security model? (multiple choice)