Which of the following HTTP status code does reflect that the requested page does not exist?

Which of the following HTTP status code does reflect that the requested page does not exist?A . 403B . 404C . 201D . 304View AnswerAnswer: B

January 7, 2021 No Comments READ MORE +

Which of the followings are not the reasons for a DDoS attack?

Which of the followings are not the reasons for a DDoS attack?A . Destroying of integrityB . Destroying of confidentialityC . Destroying of availabilityD . Destroying of business creditView AnswerAnswer: A,B,D

January 7, 2021 No Comments READ MORE +

Which command in RedHat Linux shell can be used to check disk usage?

Which command in RedHat Linux shell can be used to check disk usage?A . lsB . dfC . diskUsageD . diskSpaceView AnswerAnswer: B

January 6, 2021 No Comments READ MORE +

Which of the following functions does not belong to what WAF can provide?

Which of the following functions does not belong to what WAF can provide?A . DB encryptionB . SQL injection detectionC . XSS attack detectionD . unauthorized resource access blockingView AnswerAnswer: A

January 6, 2021 No Comments READ MORE +

Which of the following statements about CC attack is not correct?

CC attacks can cause serious damages . Which of the following statements about CC attack is not correct? Score 2A . CC attack will simulate real user requestsB . Will consume massive sever side resourceC . CC attack is done on network layerD . The request generated by CC attack...

January 6, 2021 No Comments READ MORE +

Which of the following scenarios should be handled by anti-DDOS service? (the number of correct answers: 3)

Which of the following scenarios should be handled by anti-DDOS service? (the number of correct answers: 3)A . Server is under syn flood attack, and is not reachableB . online game service which is suffering with too many empty connections and slow connectionsC . DNS server is under udp flood...

January 5, 2021 No Comments READ MORE +

Which of the following can be termed as the Denial of Service Attack? Choose the best answer.

Which of the following can be termed as the Denial of Service Attack? Choose the best answer.A . A computer on your network has crashedB . Your router is unable to find a destination outside of your networkC . Your Web server has gone into a loop trying to service...

January 5, 2021 No Comments READ MORE +

In Windows OS you can turn off a service through: Score 2

In Windows OS you can turn off a service through: Score 2A . Control Panel->Management Tool->Stop the running serviceB . Control Panel->windows update->StopC . Create new firewall rule to stop serviceD . Delete administrator role and related accountsView AnswerAnswer: A

January 5, 2021 No Comments READ MORE +

Which of the following items can't be set in ECS security group configuration? Score 2

Which of the following items can't be set in ECS security group configuration? Score 2A . OS typeB . network interfaceC . authorization policyD . authorization objectView AnswerAnswer: A

January 4, 2021 No Comments READ MORE +

What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service?

What are the advantages of anti-DDOS pro comparing to anti-DDOS basics service? (the number of correct answers: 3)A . stronger defending attacks capabilityB . elastic protection bandwidthC . no upper limit to the attack traffic need to be handledD . can do anti-fraud protectionE . can protect IDC outside Alibaba...

January 4, 2021 No Comments READ MORE +