While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?
Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )
Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities
Which of the following are the backup items that HRP can provide?
Which of the following statements are correct about IKE-based SA establishment in IPsec?
Data monitoring can be divided into two types: active analysis and passive acquisition.
When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.
Which of the following statements is incorrect about PKI?
Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.
In the PKI certificate revocation process, a user needs to send a signed and encrypted email to the RA to apply for certificate revocation.