Question 6
There ere various security threats in the use of the server. Which of the following options is not a server securitythreat?
Question 7
When using the web configuration type to do the configuration, the correct statements as following are:
(Choose two.)
Question 8
Which of the following encryption algorithm, encryption and decryption keys are the same?
Question 9
Which of the following protection levels are included in the TCSEC standard? (Multiple Choice)
Question 10
The European TCSEC Code is dividedinto two modules, Function and Evaluation, which are mainly used in the miitary, government and commercial fields
