Question 21
When an enterprise establishes its own information system, it checks every operation in accordance with the authoritative standards established internationally, and can check whether its own information system is safe or not.
Question 22
Which of the following options is correct regarding the actions of the security policy and the description of the security profile? (multiple choice)
Question 23
Which of the following statements about Internet user management is false?
Question 24
ASPF (Application specific Packet Filter) is a packet filtering technology based on the application layer and implements a special security mechanism through the server-map table. Regarding ASPF and server-map tables, which of the following are correct? (Multiple choice)
Question 25
Which of the following behavior is needed in the "Check" section in the construction management cycle of the information security system?