Which of the following is the correct sequence for incident response management
1. Detection 2 Report 3 Mitigation 4 Lessons learned 5 Fix 6 Recovery 7 Response
Answer : B
Which of the following is not an encryption algorithm in a VPN?
Answer : A
Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities
Answer : B
IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.
Answer : B
Which of the following is not an advantage of symmetric encryption algorithms?
Answer : C
The following description of digital certificates, which one is wrong
Answer : D
In cases where some configurations alter existing session table entries and want them to take effect immediately, you can regenerate the session table by clearing the session table information. All session table information can be cleared by executing the _____firewall session table command.
Answer : A