Which of the following descriptions about IKE SA is wrong?
Correct Answer:
D
When the user single sign-on is configured, the receiving PC message mode is adopted. Theauthentication process has the following steps: 1 The visitor PC executes the login script and sends the user login information to the AD monitor 2 The firewall extracts the correspondence between the user and the IP from the login information. Add to theonline user table 3 AD monitor connects to the AD server to query the login user information, and f?rwards the queried user information to the firewall. 4 The visitor logs in to the AD domain. The AD server returns the login success message to the user anddelivers the login script, which of the following order is correct?
Correct Answer:
D
Caesar Code is primarily used to encrypt data by using a stick of a specific specification
Correct Answer:
B
Which of the following are malicious programs? (Multiple choice)
Correct Answer:
ACD
Which of the following attacks is not aspecial packet attack?
Correct Answer:
C