Which of the following options are correct regarding the description of Windows log event types?
(multiple choice)
B, D
Which of the following types of encryption technology can be divided into? (multiple choice)
A, B
Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state
information? (multiple choice)
A, B, C
Which of the following isP2DRThe core part of the model?
A
Evidence identification needs to address the verification of the integrity of the evidence and
determine whether it meets the applicable standards. Which of the following statements is correct
about the criteria for identification of evidence?
A
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or
information stream, and analyze the correlation of time. Which of the following is not an evidence
analysis technique?
D
aboutAHandESPSecurity protocol, which of the following options is true? (multiple choice)
B, C
Which of the following DDoS attack types is an attack?
D
aboutSSL VPNTechnology, which of the following statements is false?
C
Which of the following options can bewindowsDo you do it in the advanced settings of the firewall?
(multiple choice)
C, D