The following describes the guiding principles for information security management Which one is incorrect? (single selection).
At this time, there is no defense against C&C attacks that use TLS for encryption
NIP's service interfaces are all working at Layer 2, which can not change the customer's existing network topology. It provides direct and transparent access to the customer network In addition, the default threat protection policy is configured, and protection can be started after connecting to the network.
Which of the following options allows complete destruction of data, (multiple selection)