搜索
Network Security for CompTIA Network+ (N10-006)
磁力链接/BT种子名称
Network Security for CompTIA Network+ (N10-006)
磁力链接/BT种子简介
种子哈希:
8a181876de129145f5f98968d18757d437c7f53d
文件大小:
752.32M
已经下载:
4866
次
下载速度:
极快
收录时间:
2020-03-28
最近下载:
2025-10-04
地址随时变,回家记住路
小野猫.com
黑猫警长.com
哆啦a猫.com
御猫.com
科目三.com
猫哭老鼠.com
女猫.com
☜☜☜找最新地址请保存左面网址
磁力链接
magnet:?xt=urn:btih:8A181876DE129145F5F98968D18757D437C7F53D
推荐使用
PIKPAK网盘
下载资源,PIKPAK是目前最好用网盘,10T超大空间,不和谐任何资源,支持无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
在线观看
世界之窗
含羞草
极乐禁地
91视频
51品茶
逼哩逼哩
萝莉岛
欲漫涩
91短视频
成人快手
抖阴破解版
ai色色
pilipili
草榴社区
哆哔涩漫
好色先生
疯马秀
TikTok成人版
悠悠禁区
波多
听泉鉴鲍
xvideo
外网天堂
PornHub
抖音Max
呦乐园
拔萝卜
糖心视频
麻豆Vlog
暗网Xvideo
资源截图
API Integration
显示图片
最近搜索
熙百合
深夜场圆圆脸知性大美女,镜头前卖力口交
fc2ppv-4
贞洁的妻子被庸俗男人的丑陋鸡巴玷污
#南南想吃糖
sop舞团
纵横四海
丰乳肥臀
smjz-026
放药
skyhd-120
hnd-439
凡人修仙传-162
露脸2025推特
丧尸
迷探路德维希2160p
超自然武装s02
小马拉大车
西比尔
jur-192
fc2 ppv
肉臀
东北淫妻
rikako katayama
婕哥
meikoui 裸舞
atv
jinricp 第三季
家有双凤
从前有个刺客
文件列表
network-security-comptia-network-plus-n10-006.zip
44.3 MB
04 Hardening a Network - Hardware/03 Demo 1 Investigating Security Policies.mp4
34.2 MB
03 Identifying Network Vulnerabilities/14 Demo 2 Exposing Unsecure Protocols.mp4
21.6 MB
04 Hardening a Network - Hardware/04 Switch Port Security.mp4
18.5 MB
09 Summarizing Basic Forensic Concepts/08 Demo 1 Reviewing a Response Policy.mp4
17.7 MB
07 Installing and Configuring a Basic Firewall/10 Demo 2 Configuring ACL Rules.mp4
16.7 MB
08 Differentiating Network Access Control Models/06 Demo 1 Configuring NAP DHCP Enforcement.mp4
14.8 MB
01 Understanding Network Security Risks/12 Demo 2 Using Nessus.mp4
14.6 MB
06 Investigating Network Security Controls/04 Network Closets.mp4
13.5 MB
02 Analyzing Network Attacks and Threats/07 Ethernet Protocol Abuse.mp4
13.0 MB
04 Hardening a Network - Hardware/07 Access Lists.mp4
12.8 MB
03 Identifying Network Vulnerabilities/04 Understanding Wi-Fi Statistics.mp4
12.6 MB
04 Hardening a Network - Hardware/02 Security Policies.mp4
12.4 MB
09 Summarizing Basic Forensic Concepts/11 Demo 3 Working with eDiscovery in SharePoint Online.mp4
12.2 MB
02 Analyzing Network Attacks and Threats/02 Denial of Service.mp4
12.2 MB
05 Hardening a Network - Software/02 Services.mp4
11.6 MB
05 Hardening a Network - Software/04 Demo 1 Configuring Services and Anti-malware.mp4
11.5 MB
02 Analyzing Network Attacks and Threats/15 Demo 2 Cracking Passwords.mp4
11.5 MB
03 Identifying Network Vulnerabilities/03 Wardriving and Warchalking.mp4
11.2 MB
07 Installing and Configuring a Basic Firewall/05 Demo 1 Managing Host-based Firewalls.mp4
11.1 MB
05 Hardening a Network - Software/09 Demo 2 Hashing and TLS in Action.mp4
10.8 MB
09 Summarizing Basic Forensic Concepts/10 Demo 2 Preparing for eDiscovery in Office 365.mp4
10.4 MB
05 Hardening a Network - Software/03 Malware and Anti-malware Software.mp4
9.3 MB
09 Summarizing Basic Forensic Concepts/04 Forensic Concepts.mp4
9.1 MB
06 Investigating Network Security Controls/05 Video Monitoring.mp4
9.0 MB
03 Identifying Network Vulnerabilities/06 WEP WPA WPS Vulnerabilities.mp4
9.0 MB
08 Differentiating Network Access Control Models/02 Network Access Control Basics.mp4
8.9 MB
02 Analyzing Network Attacks and Threats/12 Demo 1 Executing an MITM Attack.mp4
8.7 MB
01 Understanding Network Security Risks/10 Demo 1 Reviewing Security Plan Documents.mp4
8.6 MB
01 Understanding Network Security Risks/07 Avoiding a Single Point of Failure .mp4
8.5 MB
03 Identifying Network Vulnerabilities/09 Client Server Vulnerabilities.mp4
8.5 MB
06 Investigating Network Security Controls/06 Door Access Controls.mp4
8.4 MB
03 Identifying Network Vulnerabilities/02 Evil Twin.mp4
8.4 MB
04 Hardening a Network - Hardware/06 Demo 2 Experimenting with VLANs.mp4
8.3 MB
06 Investigating Network Security Controls/02 Physical Security Basics.mp4
8.3 MB
07 Installing and Configuring a Basic Firewall/02 Firewall Basics.mp4
8.2 MB
03 Identifying Network Vulnerabilities/08 Demo 1 Introducing Wi-Fi Monitoring Tools.mp4
8.1 MB
02 Analyzing Network Attacks and Threats/11 VLAN Hopping and Brute Force Attacks.mp4
8.0 MB
07 Installing and Configuring a Basic Firewall/03 Firewall Types.mp4
7.4 MB
08 Differentiating Network Access Control Models/05 Cisco NAC.mp4
7.3 MB
02 Analyzing Network Attacks and Threats/01 Overview.mp4
7.1 MB
03 Identifying Network Vulnerabilities/12 Verifying File Integrity.mp4
7.1 MB
01 Understanding Network Security Risks/01 Overview.mp4
7.1 MB
04 Hardening a Network - Hardware/01 Overview.mp4
6.7 MB
01 Understanding Network Security Risks/08 Data Breaches.mp4
6.7 MB
05 Hardening a Network - Software/11 User Authentication Basics.mp4
6.6 MB
03 Identifying Network Vulnerabilities/07 WLAN Protection Mechanisms.mp4
6.6 MB
04 Hardening a Network - Hardware/05 VLANs.mp4
6.5 MB
04 Hardening a Network - Hardware/08 Web Content Filtering.mp4
6.3 MB
04 Hardening a Network - Hardware/09 Wi-Fi Security Protocols.mp4
6.2 MB
03 Identifying Network Vulnerabilities/01 Overview.mp4
6.1 MB
07 Installing and Configuring a Basic Firewall/01 Overview.mp4
6.1 MB
05 Hardening a Network - Software/06 FTPS vs. SFTP.mp4
5.9 MB
09 Summarizing Basic Forensic Concepts/09 Electronic Discovery Concepts .mp4
5.8 MB
02 Analyzing Network Attacks and Threats/03 Distributed Denial of Service.mp4
5.8 MB
08 Differentiating Network Access Control Models/04 Network Access Protection (NAP) .mp4
5.7 MB
08 Differentiating Network Access Control Models/01 Overview.mp4
5.3 MB
08 Differentiating Network Access Control Models/03 NAC Agent Software.mp4
5.1 MB
06 Investigating Network Security Controls/03 Mantraps.mp4
5.1 MB
05 Hardening a Network - Software/01 Overview.mp4
5.0 MB
01 Understanding Network Security Risks/03 Uptime vs. Availability.mp4
5.0 MB
02 Analyzing Network Attacks and Threats/14 Compromised System.mp4
4.9 MB
02 Analyzing Network Attacks and Threats/06 Reflection Amplification Attack.mp4
4.6 MB
09 Summarizing Basic Forensic Concepts/02 A Personal Story.mp4
4.5 MB
01 Understanding Network Security Risks/02 Case Study Network.mp4
4.4 MB
03 Identifying Network Vulnerabilities/10 Open Ports.mp4
4.3 MB
05 Hardening a Network - Software/05 Secure Protocols.mp4
4.2 MB
07 Installing and Configuring a Basic Firewall/06 Zones of Trust.mp4
4.0 MB
03 Identifying Network Vulnerabilities/11 Unsecure Protocols.mp4
4.0 MB
01 Understanding Network Security Risks/04 DR vs. Business Continuity.mp4
4.0 MB
01 Understanding Network Security Risks/11 Proactive Network Protection.mp4
4.0 MB
02 Analyzing Network Attacks and Threats/04 IRC and LOIC.mp4
4.0 MB
03 Identifying Network Vulnerabilities/05 Bluejacking and Bluesnarfing.mp4
3.8 MB
08 Differentiating Network Access Control Models/07 Demo 2 Testing NAP.mp4
3.8 MB
02 Analyzing Network Attacks and Threats/05 Smurf Attack.mp4
3.8 MB
06 Investigating Network Security Controls/07 Biometrics.mp4
3.7 MB
05 Hardening a Network - Software/12 User Authentication Protocols.mp4
3.7 MB
07 Installing and Configuring a Basic Firewall/08 Routed vs. Virtual Wire Firewall Interfaces.mp4
3.7 MB
06 Investigating Network Security Controls/01 Overview.mp4
3.6 MB
05 Hardening a Network - Software/08 Hashing Functions.mp4
3.5 MB
09 Summarizing Basic Forensic Concepts/01 Overview.mp4
3.3 MB
02 Analyzing Network Attacks and Threats/09 The Importance of ARP.mp4
3.3 MB
01 Understanding Network Security Risks/09 DR Standards and Policies.mp4
3.3 MB
01 Understanding Network Security Risks/05 Risk.mp4
3.2 MB
07 Installing and Configuring a Basic Firewall/07 Firewall Placement.mp4
3.2 MB
01 Understanding Network Security Risks/06 Critical Nodes and Assets.mp4
3.0 MB
07 Installing and Configuring a Basic Firewall/04 Unified Threat Management.mp4
3.0 MB
09 Summarizing Basic Forensic Concepts/05 Incident Response Policy.mp4
2.9 MB
04 Hardening a Network - Hardware/10 IEEE 802.1X.mp4
2.8 MB
09 Summarizing Basic Forensic Concepts/07 EnCase Forensic.mp4
2.7 MB
04 Hardening a Network - Hardware/11 Other Wi-Fi Security Options.mp4
2.7 MB
05 Hardening a Network - Software/07 How TLS SSL Works.mp4
2.6 MB
01 Understanding Network Security Risks/13 Case Study Network, Revisited.mp4
2.6 MB
06 Investigating Network Security Controls/09 Summary.mp4
2.5 MB
07 Installing and Configuring a Basic Firewall/12 Summary.mp4
2.4 MB
09 Summarizing Basic Forensic Concepts/06 Evidence and Data Collection.mp4
2.2 MB
02 Analyzing Network Attacks and Threats/17 Summary.mp4
2.2 MB
07 Installing and Configuring a Basic Firewall/09 Access Control Lists.mp4
2.2 MB
02 Analyzing Network Attacks and Threats/10 SYN Flood Attack.mp4
2.1 MB
03 Identifying Network Vulnerabilities/13 TEMPEST.mp4
2.1 MB
09 Summarizing Basic Forensic Concepts/03 Defining Computer Forensics.mp4
2.1 MB
08 Differentiating Network Access Control Models/08 Case Study Network, Revisited.mp4
2.1 MB
02 Analyzing Network Attacks and Threats/08 Man-in-the-middle Attack.mp4
2.0 MB
08 Differentiating Network Access Control Models/10 Summary.mp4
2.0 MB
08 Differentiating Network Access Control Models/09 For Further Learning.mp4
2.0 MB
03 Identifying Network Vulnerabilities/16 Summary.mp4
1.8 MB
01 Understanding Network Security Risks/15 Summary.mp4
1.8 MB
04 Hardening a Network - Hardware/13 Summary.mp4
1.6 MB
09 Summarizing Basic Forensic Concepts/13 Summary.mp4
1.6 MB
07 Installing and Configuring a Basic Firewall/11 For Further Learning.mp4
1.4 MB
06 Investigating Network Security Controls/08 For Further Learning.mp4
1.4 MB
09 Summarizing Basic Forensic Concepts/12 For Further Learning.mp4
1.3 MB
02 Analyzing Network Attacks and Threats/16 For Further Learning.mp4
1.2 MB
03 Identifying Network Vulnerabilities/15 For Further Learning.mp4
1.1 MB
05 Hardening a Network - Software/10 Definition Authentication.mp4
1.1 MB
02 Analyzing Network Attacks and Threats/13 Human Factors.mp4
991.6 kB
05 Hardening a Network - Software/13 For Further Learning.mp4
986.6 kB
01 Understanding Network Security Risks/14 For Further Learning.mp4
964.8 kB
05 Hardening a Network - Software/14 Summary.mp4
806.8 kB
04 Hardening a Network - Hardware/12 For Further Learning.mp4
692.7 kB
08 Differentiating Network Access Control Models/06 Demo 1 Configuring NAP DHCP Enforcement.srt
8.9 kB
04 Hardening a Network - Hardware/04 Switch Port Security.srt
8.2 kB
07 Installing and Configuring a Basic Firewall/02 Firewall Basics.srt
7.2 kB
02 Analyzing Network Attacks and Threats/02 Denial of Service.srt
7.2 kB
05 Hardening a Network - Software/02 Services.srt
7.2 kB
05 Hardening a Network - Software/03 Malware and Anti-malware Software.srt
6.7 kB
08 Differentiating Network Access Control Models/02 Network Access Control Basics.srt
6.6 kB
07 Installing and Configuring a Basic Firewall/10 Demo 2 Configuring ACL Rules.srt
6.4 kB
06 Investigating Network Security Controls/05 Video Monitoring.srt
6.4 kB
04 Hardening a Network - Hardware/03 Demo 1 Investigating Security Policies.srt
6.3 kB
01 Understanding Network Security Risks/07 Avoiding a Single Point of Failure .srt
6.2 kB
07 Installing and Configuring a Basic Firewall/03 Firewall Types.srt
6.2 kB
01 Understanding Network Security Risks/12 Demo 2 Using Nessus.srt
5.8 kB
03 Identifying Network Vulnerabilities/02 Evil Twin.srt
5.7 kB
07 Installing and Configuring a Basic Firewall/05 Demo 1 Managing Host-based Firewalls.srt
5.6 kB
09 Summarizing Basic Forensic Concepts/08 Demo 1 Reviewing a Response Policy.srt
5.6 kB
04 Hardening a Network - Hardware/07 Access Lists.srt
5.5 kB
06 Investigating Network Security Controls/04 Network Closets.srt
5.5 kB
01 Understanding Network Security Risks/08 Data Breaches.srt
5.4 kB
06 Investigating Network Security Controls/06 Door Access Controls.srt
5.4 kB
09 Summarizing Basic Forensic Concepts/10 Demo 2 Preparing for eDiscovery in Office 365.srt
5.3 kB
05 Hardening a Network - Software/09 Demo 2 Hashing and TLS in Action.srt
5.3 kB
06 Investigating Network Security Controls/03 Mantraps.srt
5.3 kB
01 Understanding Network Security Risks/01 Overview.srt
5.1 kB
04 Hardening a Network - Hardware/01 Overview.srt
5.1 kB
06 Investigating Network Security Controls/02 Physical Security Basics.srt
5.0 kB
05 Hardening a Network - Software/06 FTPS vs. SFTP.srt
5.0 kB
02 Analyzing Network Attacks and Threats/01 Overview.srt
4.9 kB
09 Summarizing Basic Forensic Concepts/04 Forensic Concepts.srt
4.9 kB
02 Analyzing Network Attacks and Threats/12 Demo 1 Executing an MITM Attack.srt
4.9 kB
09 Summarizing Basic Forensic Concepts/11 Demo 3 Working with eDiscovery in SharePoint Online.srt
4.9 kB
05 Hardening a Network - Software/04 Demo 1 Configuring Services and Anti-malware.srt
4.9 kB
07 Installing and Configuring a Basic Firewall/01 Overview.srt
4.7 kB
03 Identifying Network Vulnerabilities/14 Demo 2 Exposing Unsecure Protocols.srt
4.7 kB
04 Hardening a Network - Hardware/02 Security Policies.srt
4.6 kB
03 Identifying Network Vulnerabilities/08 Demo 1 Introducing Wi-Fi Monitoring Tools.srt
4.6 kB
08 Differentiating Network Access Control Models/05 Cisco NAC.srt
4.5 kB
04 Hardening a Network - Hardware/06 Demo 2 Experimenting with VLANs.srt
4.3 kB
02 Analyzing Network Attacks and Threats/11 VLAN Hopping and Brute Force Attacks.srt
4.3 kB
02 Analyzing Network Attacks and Threats/07 Ethernet Protocol Abuse.srt
4.3 kB
05 Hardening a Network - Software/05 Secure Protocols.srt
4.3 kB
03 Identifying Network Vulnerabilities/03 Wardriving and Warchalking.srt
4.3 kB
01 Understanding Network Security Risks/03 Uptime vs. Availability.srt
4.3 kB
03 Identifying Network Vulnerabilities/01 Overview.srt
4.2 kB
05 Hardening a Network - Software/11 User Authentication Basics.srt
4.1 kB
03 Identifying Network Vulnerabilities/04 Understanding Wi-Fi Statistics.srt
4.1 kB
04 Hardening a Network - Hardware/05 VLANs.srt
4.0 kB
02 Analyzing Network Attacks and Threats/15 Demo 2 Cracking Passwords.srt
3.9 kB
02 Analyzing Network Attacks and Threats/03 Distributed Denial of Service.srt
3.9 kB
08 Differentiating Network Access Control Models/01 Overview.srt
3.9 kB
04 Hardening a Network - Hardware/09 Wi-Fi Security Protocols.srt
3.8 kB
03 Identifying Network Vulnerabilities/09 Client Server Vulnerabilities.srt
3.7 kB
08 Differentiating Network Access Control Models/04 Network Access Protection (NAP) .srt
3.7 kB
08 Differentiating Network Access Control Models/03 NAC Agent Software.srt
3.6 kB
05 Hardening a Network - Software/01 Overview.srt
3.5 kB
09 Summarizing Basic Forensic Concepts/09 Electronic Discovery Concepts .srt
3.5 kB
04 Hardening a Network - Hardware/08 Web Content Filtering.srt
3.4 kB
03 Identifying Network Vulnerabilities/07 WLAN Protection Mechanisms.srt
3.3 kB
05 Hardening a Network - Software/12 User Authentication Protocols.srt
3.3 kB
01 Understanding Network Security Risks/11 Proactive Network Protection.srt
3.2 kB
03 Identifying Network Vulnerabilities/06 WEP WPA WPS Vulnerabilities.srt
3.1 kB
05 Hardening a Network - Software/08 Hashing Functions.srt
3.0 kB
01 Understanding Network Security Risks/10 Demo 1 Reviewing Security Plan Documents.srt
3.0 kB
01 Understanding Network Security Risks/02 Case Study Network.srt
2.9 kB
02 Analyzing Network Attacks and Threats/04 IRC and LOIC.srt
2.9 kB
01 Understanding Network Security Risks/09 DR Standards and Policies.srt
2.8 kB
03 Identifying Network Vulnerabilities/10 Open Ports.srt
2.8 kB
07 Installing and Configuring a Basic Firewall/07 Firewall Placement.srt
2.8 kB
01 Understanding Network Security Risks/04 DR vs. Business Continuity.srt
2.7 kB
09 Summarizing Basic Forensic Concepts/01 Overview.srt
2.7 kB
02 Analyzing Network Attacks and Threats/14 Compromised System.srt
2.6 kB
09 Summarizing Basic Forensic Concepts/05 Incident Response Policy.srt
2.6 kB
06 Investigating Network Security Controls/07 Biometrics.srt
2.6 kB
09 Summarizing Basic Forensic Concepts/02 A Personal Story.srt
2.6 kB
09 Summarizing Basic Forensic Concepts/06 Evidence and Data Collection.srt
2.5 kB
03 Identifying Network Vulnerabilities/11 Unsecure Protocols.srt
2.5 kB
06 Investigating Network Security Controls/09 Summary.srt
2.4 kB
07 Installing and Configuring a Basic Firewall/06 Zones of Trust.srt
2.4 kB
07 Installing and Configuring a Basic Firewall/08 Routed vs. Virtual Wire Firewall Interfaces.srt
2.4 kB
06 Investigating Network Security Controls/01 Overview.srt
2.4 kB
01 Understanding Network Security Risks/05 Risk.srt
2.4 kB
01 Understanding Network Security Risks/06 Critical Nodes and Assets.srt
2.3 kB
03 Identifying Network Vulnerabilities/12 Verifying File Integrity.srt
2.3 kB
08 Differentiating Network Access Control Models/07 Demo 2 Testing NAP.srt
2.3 kB
07 Installing and Configuring a Basic Firewall/12 Summary.srt
2.2 kB
07 Installing and Configuring a Basic Firewall/04 Unified Threat Management.srt
2.2 kB
02 Analyzing Network Attacks and Threats/05 Smurf Attack.srt
2.1 kB
03 Identifying Network Vulnerabilities/05 Bluejacking and Bluesnarfing.srt
2.0 kB
05 Hardening a Network - Software/07 How TLS SSL Works.srt
2.0 kB
04 Hardening a Network - Hardware/10 IEEE 802.1X.srt
1.8 kB
02 Analyzing Network Attacks and Threats/10 SYN Flood Attack.srt
1.8 kB
08 Differentiating Network Access Control Models/10 Summary.srt
1.7 kB
09 Summarizing Basic Forensic Concepts/03 Defining Computer Forensics.srt
1.7 kB
02 Analyzing Network Attacks and Threats/17 Summary.srt
1.7 kB
02 Analyzing Network Attacks and Threats/06 Reflection Amplification Attack.srt
1.7 kB
07 Installing and Configuring a Basic Firewall/09 Access Control Lists.srt
1.7 kB
01 Understanding Network Security Risks/15 Summary.srt
1.6 kB
09 Summarizing Basic Forensic Concepts/13 Summary.srt
1.6 kB
03 Identifying Network Vulnerabilities/16 Summary.srt
1.5 kB
08 Differentiating Network Access Control Models/08 Case Study Network, Revisited.srt
1.4 kB
01 Understanding Network Security Risks/13 Case Study Network, Revisited.srt
1.4 kB
03 Identifying Network Vulnerabilities/13 TEMPEST.srt
1.4 kB
02 Analyzing Network Attacks and Threats/08 Man-in-the-middle Attack.srt
1.4 kB
04 Hardening a Network - Hardware/11 Other Wi-Fi Security Options.srt
1.3 kB
04 Hardening a Network - Hardware/13 Summary.srt
1.3 kB
08 Differentiating Network Access Control Models/09 For Further Learning.srt
1.2 kB
09 Summarizing Basic Forensic Concepts/07 EnCase Forensic.srt
1.2 kB
05 Hardening a Network - Software/10 Definition Authentication.srt
1.2 kB
06 Investigating Network Security Controls/08 For Further Learning.srt
1.1 kB
02 Analyzing Network Attacks and Threats/09 The Importance of ARP.srt
1.1 kB
02 Analyzing Network Attacks and Threats/13 Human Factors.srt
1.0 kB
07 Installing and Configuring a Basic Firewall/11 For Further Learning.srt
986 Bytes
09 Summarizing Basic Forensic Concepts/12 For Further Learning.srt
822 Bytes
05 Hardening a Network - Software/14 Summary.srt
804 Bytes
02 Analyzing Network Attacks and Threats/16 For Further Learning.srt
751 Bytes
03 Identifying Network Vulnerabilities/15 For Further Learning.srt
724 Bytes
05 Hardening a Network - Software/13 For Further Learning.srt
672 Bytes
01 Understanding Network Security Risks/14 For Further Learning.srt
646 Bytes
04 Hardening a Network - Hardware/12 For Further Learning.srt
398 Bytes
温馨提示
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!