Question 21

Which of the following attack methods is to construct special SQL statements and submit sensitive information to exploit program vulnerabilities
  • Question 22

    A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.
  • Question 23

    As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?
  • Question 24

    As shown in the figure, the process of AD single sign-on (querying the security log mode of AD server), please match the corresponding operation process.

    Question 25

    In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*