Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

While working for a company, Tom receives an email with an attachment. Which of the following operations is correct?

A.

Checking the email's content. If the email is related to work, Tom can open and save the attachment

B.

Opening the attachment directly because email attachments do not affect information security

C.

Checking the email sender. If the email was sent from the company's mailbox, Tom can open and save the attachment

D.

Checking the sender and email information, and using antivirus software to check the attachment

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

A.

TURE

B.

False

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities

A.

Buffer overflow attack

B.

SQL injection attacks

C.

Worm attack

D.

Phishing attacks

Which of the following are the backup items that HRP can provide?

A.

Mouth Server-map table entry

B.

Mouth No-PAT table entry

C.

Mouth ARP table entry

D.

Port TCP session table

Which of the following statements are correct about IKE-based SA establishment in IPsec?

A.

SAs are valid permanently.

B.

IKE-based SA establishment applies to medium- and large-sized networks.

C.

The SPI value is generated randomly.

D.

Keys are generated using the DH algorithm and dynamically updated.

Data monitoring can be divided into two types: active analysis and passive acquisition.

A.

TRUE

B.

FALSE

When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is empty, the switch discards the unicast frame.

A.

TRUE

B.

FALSE

Which of the following statements is incorrect about PKI?

A.

PKI enables users to verify the validity of access devices, ensuring that users connect to secure and legitimate networks.

B.

PKI prevents attacks initiated by malicious users resending obtained packets.

C.

PKI ensures that data is accessible only to authorized devices and users, protecting data privacy.

D.

PKI protects data against tampering and eavesdropping, ensuring the privacy of data transmitted on the network.

Sub-interfaces can be created on GE0/0/1 of a firewall. The sub-interfaces can be added to different VLANs, but cannot be added to security zones.

A.

TRUE

B.

FALSE

In the PKI certificate revocation process, a user needs to send a signed and encrypted email to the RA to apply for certificate revocation.

A.

TRUE

B.

FALSE