A. SQL injection
B. File uploading vulnerability
C. CSRF(cross site request fraud)vulnerability
D. System Command Execution vulnerability
A. One host simulate many IP addresses
B. ICMP flood
C. SYN flood
D. Zombie network
E. Attack through agent
A. change HTTP service to HTTPS service
B. use WAF
C. resolve domain name to a disguised IP
D. change the service providing port
A. stop the service itself
B. stop all guest role access
C. update OS patch
D. adjust firewall rule
E. adjust local security policy
A. bind real customer identity to anti-DDOS pro IP
B. configure to be protected domain name
C. add new DNS record
D. change source IP
E. if original server is using its own firewall, then need to add Anti-DDOS pro IP to its white list
A. shutdown
B. restart
C. init
D. reload
A. DNS spoofing
B. MITM
C. Ping sweep
D. DoS
A. It can send warning message to 'Server Guard' user
B. It can detect the attacking tool used by attacker
C. It needs to setup common logon location in 'Server Guard' configuration
D. It can detect the remote logon used source IP address
A. change'Administrator' to some other name
B. with'Server Guard protection In Allbaba Cloud,you can set password to some easy to remember words.
C. except for some necessary accounts for system manogement,.dlsoble or delete other seldomly used accounts
D. always set a complexed passwcwd using combination of numbers,letters and other characters
A. File uploading vulnerability
B. SQL Injection
C. Kernel privilege breaking
D. XSS exploit