Question 246

Under normal circumstances, the Emai1 protocols we often talk about include ____, POP3, and SMTP.[fill in the blank]*

Question 247

If users on the external network (where the security zone is Untrust) are allowed to access the intranet server (where the security zone is DMZ), the destination security zone selected when configuring the security policy is ________.
  • Question 248

    The repair of anti-virus software only needs to repair some system files that were accidentally deleted when scanning and killing viruses to prevent the system from crashing
  • Question 249

    Which items are the encryption techniques used by digital envelopes? (Multiple Choice)
  • Question 250

    "Implement security monitoring and management of information and information systems to prevent illegal use of information and information systems", in order to achieve which feature in information security?