Question 91
Which of the following options does not belong to the log type of the Windows operating system?
Question 92
Social engineering is a means of harm such as deception, injury, etc. through psychological traps such as psychological weakness, instinctive reaction, curiosity, trust, and greed
Question 93
Which of the Policy Center functional areas is wrong?
Question 94
Which of the following is not a hash algorithm?
Question 95
Which of the following mechanisms are used in the MAC flooding attack? (Multiple choice)
