Chapter I.
1, the 3 Basic Objectives of information security are: confidentiality , integrity and availability . In addition, there is a non-negligible goal: legal use .
2 4 Information disclosure and
3. Access control policies can be divided into: Mandatory access control policy and the Autonomous access Control Strategy .
4. Security attacks can be divided into: Passive Attack and the Active Attack .
5. x.800the 5 Types of security services defined are: Certifications,Access Control,Data Privacy,Data Integrity,Non-repudiation.
6. x.800The 8 Specific security mechanisms defined are: Encrypt,Digital Signatures,Access Control,Data Integrity,Certified Exchange,Flow Fill,Routing Controland thenotarization.
7. x.800the 5 General Security mechanisms defined are: Trusted Functionality,Safety Signs,Event Detection,Security Audit Trailand theSafe Recovery.
Chapter II
1, host ipv4 32 b, host mac address length is 48 b ipv6 128 b
2 arp The main function is to be ip address translation becomes physical address
3 nat The main function is to implement network address and ip The conversion between addresses, which resolves ipv4 address shortage.
4,theDNS service uses a port, which is used to implement the domain name to the IP address or the mapping of the IP address to the domain name .
Cyber security answer in the blanks