Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

The following description of the AH protocol in IPSec VPN, which one is wrong?

A.

Supports data source validation

B.

Supports data integrity checking

C.

Supports packet encryption

D.

Support anti-message replay

The RADIUS protocol specifies how to pass user information, billing information, authentication and billing results between the NAS and the RADIUS server, and the RADIUS server is responsible for receiving the user's connection request, completing the authentication, and returning the result to the NAS.

A.

TRUE

B.

FALSE

Which of the following descriptions of single sign-on is correct?

A.

The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server.

B.

The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to FW. F7 only records the identity information of the visitor and does not participate in the authentication process

C.

Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication.

D.

The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the FW.

As shown, in transmission mode, which of the following locations should the AH header be inserted in?

A.

3

B.

2

C.

1

D.

4

The following description of the construction of a digital certificate, which item is wrong

A.

The name of the device that issued the certificate can be different from the subject name in the issuer certificate.

B.

The structure of the certificate follows the specification of the X.509 v3 version.

C.

The simplest certificate consists of a public key, a name, and a digital signature from a certificate authority.

D.

The issuer signs the certificate information with the private key.

Which of the following is not a type of Windows log event?

A.

Information

B.

Debugging

C.

Error

D.

Warning