A. Mirror capture
B. The protection object is caught abnormally.
C. Protection object attack packet capture
D. ACL capture
E. Globally discard packets
A. True
B. False
A. The sandbox is a straight-line device that can directly kill the threat sample.
B. You can use MTA to process the mail, so you can block the threat directly after detecting the damage.
C. The sandbox will take the initiative to clear the part of the virus sample, similar to anti-virus software.
D. The sandbox needs to be linked with other security devices to block the threat.
A. Manual mode AUTO
B. Manual mode manual
C. Separation mode SPLIT
D. Full routing mode FULL
A. SPI
B. Destination IP address
C. Security protocol number
D. Source IP address
A. SYN Flood false source attack
B. ACK Flood
C. TCP connection exhaustion attack
D. DNS Request Flood
A. aaaabbbb
B. abababab
C. abbaabba
D. aaaaaaaa