The following description of the AH protocol in IPSec VPN, which one is wrong?
Answer : C
ARP man-in-the-middle attacks are a type of spoofing attack technique.
Answer : A
Which of the following operating modes does NTP support?
Answer : A, B, C, D
Which of the following descriptions of server authentication is correct?
Answer : A
As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.
Answer : B
The following description of digital certificates, which one is wrong
Answer : D
An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*
Answer : B, C, D