Which of the following statement is NOT correct regarding to this scenario?
Reliable server daily operation and security management are essential for continuous service running . Which of the following statement is NOT correct regarding to this scenario?A . set easy to remember password to help administrator quickly login and solve problemsB . patch system timely and frequentlyC . enable build-in OS...
In order to stop the service provided through a particular port in Windows OS, which of the following methods can be used to achieve this objective? (the number of correct answers: 3)
In order to stop the service provided through a particular port in Windows OS, which of the following methods can be used to achieve this objective? (the number of correct answers: 3)A . adjust firewall ruleB . adjust local security policyC . update OS patchD . stop the service itselfE...
Which of the following function is provided by 'server guard' patch management service?
Which of the following function is provided by 'server guard' patch management service?A . fix vulnerability found in open source software using Alibaba self-developed patchB . detect any vulnerability before it burstsC . release official patches for any exposed vulnerabilityD . stop hacker's vulnerabilities probingView AnswerAnswer: B
Which of the following shell command can be used to check disk usage in a Linux OS ECS
Which of the following shell command can be used to check disk usage in a Linux OS ECSA . Df ChB . EchoC . Free CmD . Ps Ce CoView AnswerAnswer: A
What of the followings will happen if encounter DoS or DDoS attack?
What of the followings will happen if encounter DoS or DDoS attack?A . Data received successfullyB . Delay of data receptionC . Slow access web resourcesD . unauthorized access controlView AnswerAnswer: B,C
Which of the following DDoS descriptions are correct?
Which of the following DDoS descriptions are correct?A . In order to get admin passwordB . Steal confidential informationC . Causes the target server unable to process legitimate requestsD . If the target server has no vulnerabilities, the remote attack may still succeed.View AnswerAnswer: C,D
Which of the following statements about VLAN are NOT true? (the number of correct answers: 3) Score 1
Which of the following statements about VLAN are NOT true? (the number of correct answers: 3) Score 1A . users in different VLAN can connect each other directly without pre-configurationB . different VLAN means different physical location of switchesC . VLAN configuration can be done through an TCP/IP router deviceD...
Which of the following protocol is dedicated to resolve IP and MAC addresses?
Which of the following protocol is dedicated to resolve IP and MAC addresses?A . TCPB . ARPC . DNSD . ICMPView AnswerAnswer: B
Which of the following would be the best way to test your server for its weaknesses?
You are planning on hosting an eCommerce Web server. You are intent on making the server secure against all external attacks possible . Which of the following would be the best way to test your server for its weaknesses? Choose the best answer.A . Ping to the serverB . Simulate...
Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model? Score 2
Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model? Score 2A . ICMPB . ARPC . FTPD . UDPView AnswerAnswer: B