ACA-Sec1試験無料問題集「Alibaba ACA Cloud Security Certification 認定」

Which of the following statements are true to describe a SQL attack commonly used pattern? (the number of correct answers: 3)

正解:C,D,E 解答を投票する
Which of the following protocols will not be used for a SYN Flood attack?

正解:B,C,D 解答を投票する
You configure a computer to act as a zombie set in order to attack a web server on a specific date.
What would this contaminated computer be part of?

Which command in RedHat Linux shell can be used to check disk usage?

Which of the following function is provided by 'server guard' patch management service?

Which of these options contains the three basic target categories for a DoS or a DDoS?

In May 2017 a new blackmail virus WannaCry burst globally, using Windows OS open port 445 to initiate its attacks. What is the quickest way to prevent this kind of attacks?

CC customized protection rule supports you to define customized configuration setting.
Which of following items can be self-defined? (the number of correct answers: 3)

正解:B,C,E 解答を投票する
. In the ISO/OSI 7 layers networking model, which of the following functions are provided for the 'network layer'? (the number of correct answers: 2)

What of the followings will happen if encounter DoS or DDoS attack?