From which of the following attacks WAF will not provide protection?
From which of the following attacks WAF will not provide protection?A . SYN FloodB . Web Server vulnerability attackC . Core files unauthorized accessD . HTTP FloodView AnswerAnswer: A
If your company's official website is tampered, the consequence of such attack could NOT be:
If your company's official website is tampered, the consequence of such attack could NOT be:A . Website is used for some illegal attemptsB . Public image or reputation of your company is damagedC . Business is impactedD . Physical server is damagedView AnswerAnswer: D
Which of the following application vulnerabilities are not as popular as others?
Which of the following application vulnerabilities are not as popular as others?A . SQL InjectionB . XSS exploitC . File uploading vulnerabilityD . Kernel privilege breakingView AnswerAnswer: D
What design flaw of TCP/IP protocol does SYN flood attack use?
What design flaw of TCP/IP protocol does SYN flood attack use?A . UDP stateless connectioB . DNS 3 times hands shakeC . TCP 3 times hands shakeD . HTTP plain text transmissionView AnswerAnswer: C
Which of the following statements is true about HTTP protocol? Score 2
Which of the following statements is true about HTTP protocol? Score 2A . HTTP is a network layer protocolB . the data transmitted by this protocol is auto-encryptedC . default service port is 80D . HTTP protocol can't be used to transmit fileView AnswerAnswer: C
Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately stored
Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately storedA . ECSB . SLBC . RDSD . OSSE . KMSView AnswerAnswer: A,B,C,D
Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1
Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1A . SYN floodB . ICMP floodC . One host simulate many IP addressesD . Attack through agentE . Zombie networkView AnswerAnswer: C,D,E
In a regular server maintenance operation, the purpose of installing a patch on the operating system is?
In a regular server maintenance operation, the purpose of installing a patch on the operating system is?A . To improve server resource usageB . to improve system usabilityC . to enhance system functionalityD . to avoid existing system vulnerabilities being used by some hackersView AnswerAnswer: D
If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?
If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?A . enable CDN and change anti-DDOS pro IP to CDN addressB . add anti-DDOS pro IP into customer...
Which of the following protocols will not be used for a SYN Flood attack?
Which of the following protocols will not be used for a SYN Flood attack?A . UDPB . TCPC . IPX/SPXD . AppleTalkView AnswerAnswer: A,C,D