Question 1
ARP man-in-the-middle attacks are a type of spoofing attack technique.
Question 2
Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*
Question 3
Which of the following protocols is a file transfer protocol?
Question 4
What is the protocol number of the GRE protocol?
Question 5
Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*