Network security is the protection of the underlying networking infrastructure from (作答此空)access, misuse, or theft, It involves creating a secure infrastructure for devices, users and applications to work in a ( ) manner. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements ( ) and controls. Authorized users gain access to network resources. A ( ) is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. A virtual ( ) network encrypts the connection from an endpoint to a network, often over the internet. Typically a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
- A.unauthorized
 - B.authorized
 - C.normal
 - D.frequent
 
正确答案及解析
正确答案
解析
网络安全是保护底层网络基础设施免受非授权访问、误用或盗窃,它涉及为设备、用户和应用程序创建一个安全的基础设施,使其以安全方式工作。网络安全结合了边缘和网络中的多层防御。每个网络安全层实现策略和控制。授权用户可以访问网络资源。防火墙是一种网络安全设备,用于监控传入和传出的网络流量,并根据定义的一组安全规则决定是否允许或阻止特定的流量专用网络通常通过internet对端点到网络的连接进行加密。通常,远程访问VPN使用IPsec或安全套接字层来验证设备和网络之间的通信。
包含此试题的试卷
你可能感兴趣的试题
( )is that it provides guidance and direction on how quality will be managed and verified throughout the project.
- 
                
- A.Plan Quality Management
 - B.Manage Quality
 - C.Control Quality
 - D.Project Charter
 
 - 查看答案
 
( )the process of determining,documenting,and managing stakeholder needs and requirements to meet Project objectives.
- 
                
- A.Plan Scope Management
 - B.Collection Requirements
 - C.Validate Scope
 - D.Control Scope
 
 - 查看答案
 
The information security management system preserves the confidentiality,integrity and availability of information by applying a( ).
- 
                
- A.technology management process
 - B.resource management process
 - C.quality management process
 - D.risk management process
 
 - 查看答案
 
( )is a decentralized database,ensure that the data will not be tampered with and forged.
- 
                
- A.Artificial intelligence
 - B.Blockchain
 - C.Sensing technology
 - D.Big datA
 
 - 查看答案
 
( )puts computer resources on the web,and must meet the requirements of super capacity,super concurrency,super speed and super security.
- 
                
- A.Cloud computing
 - B.Big datA
 - C.Blockchain
 - D.Internet of things
 
 - 查看答案