A. Normal Mode
B. Warning Mode
C. Restriction Mode
D. Protection Mode
A. One client host can access another client's data
B. Hacker can access host server directly
C. Incorrect client resource usage calculating
D. User service become unavailable
A. military commander system down
B. physical server broken
C. DNS service down
D. web service down
A. Other users (outside of this user group) can execute this file
B. The owner of this file has read/write/execution privilege to this file
C. This file is a text file
D. The access privilege of this user group is read only
A. Massive traffic flood attack
B. Physical Fiber Channel Cable is broken
C. Software version is not up to date
D. Data under transferring is being sniffed
A. diskSpace
B. diskUsage
C. ls
D. df
A. CC attack is done on network layer
B. CC attack will simulate real user requests
C. Will consume massive sever side resource
D. The request generated by CC attack is hard to be distinguished from normal requests
A. SYNC_SENT- ->ESTABLISHED-->FIN_WAIT1-->FIN_WAIT2-->CLOSE_WAIT
B. SYNC_RCVD- ->ESTABLISHED-->CLOSE_WAIT-->TIME_WAIT-->LAST_ACK
C. SYNC_SENT- ->ESTABLISHED-->FIN_WAIT1-->FIN_WAIT2-->TIME_WAIT
D. SYNC_SENT- ->SYNC_RCVD-->ESTABLISHED-->FIN_WAIT1-->FIN_WAIT2
A. SQL injection
B. File uploading vulnerability
C. CSRF(cross site request fraud)vulnerability
D. System Command Execution vulnerability
A. physical server damage
B. service running on that server is not available
C. compromise the reputation of service provider on that server
D. sensitive data leak