Question 86
Both A and B communicate data. If an asymmetric encryption algorithm is used for encryption, when A sends data to B, which of the following keys will be used for data encryption?
Question 87
When the firewall hard disk is in place, which of the following is correct description for the firewall log?
Question 88
Which of the following is true about the sequencing of the PKI work process?
1. The communication terminal applies for CA certificate.
2. PKI replies to CA certificate
3. Obtain each other's certificate and verify the validity
4. Communication terminal installs local certificate
5. PKI issues a local certificate
6. The communication terminal applies for a local certificate
7. Communication terminal installs CA certificate
8. Communicate with each other
Question 89
Ininformation security prevention, commonly used security products are firewalls, Anti-DDos devices and IPS/IDS devices.
Question 90
Which of the following statement about the NAT is wrong?
