Question 1

ARP man-in-the-middle attacks are a type of spoofing attack technique.
  • Question 2

    Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*
  • Question 3

    Which of the following protocols is a file transfer protocol?
  • Question 4

    What is the protocol number of the GRE protocol?
  • Question 5

    Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*