From which of the following attacks WAF will not provide protection?

From which of the following attacks WAF will not provide protection?A . SYN FloodB . Web Server vulnerability attackC . Core files unauthorized accessD . HTTP FloodView AnswerAnswer: A

January 2, 2021 No Comments READ MORE +

If your company's official website is tampered, the consequence of such attack could NOT be:

If your company's official website is tampered, the consequence of such attack could NOT be:A . Website is used for some illegal attemptsB . Public image or reputation of your company is damagedC . Business is impactedD . Physical server is damagedView AnswerAnswer: D

January 2, 2021 No Comments READ MORE +

Which of the following application vulnerabilities are not as popular as others?

Which of the following application vulnerabilities are not as popular as others?A . SQL InjectionB . XSS exploitC . File uploading vulnerabilityD . Kernel privilege breakingView AnswerAnswer: D

January 1, 2021 No Comments READ MORE +

What design flaw of TCP/IP protocol does SYN flood attack use?

What design flaw of TCP/IP protocol does SYN flood attack use?A . UDP stateless connectioB . DNS 3 times hands shakeC . TCP 3 times hands shakeD . HTTP plain text transmissionView AnswerAnswer: C

January 1, 2021 No Comments READ MORE +

Which of the following statements is true about HTTP protocol? Score 2

Which of the following statements is true about HTTP protocol? Score 2A . HTTP is a network layer protocolB . the data transmitted by this protocol is auto-encryptedC . default service port is 80D . HTTP protocol can't be used to transmit fileView AnswerAnswer: C

January 1, 2021 No Comments READ MORE +

Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately stored

Which of the following Alibaba Cloud products need to be considered to use if you want to build an elastic computing cluster to provide web service together and also with dynamic data and static data separately storedA . ECSB . SLBC . RDSD . OSSE . KMSView AnswerAnswer: A,B,C,D

January 1, 2021 No Comments READ MORE +

Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1

Which of following attacks could serve as a CC attack? (the number of correct answers: 3) Score 1A . SYN floodB . ICMP floodC . One host simulate many IP addressesD . Attack through agentE . Zombie networkView AnswerAnswer: C,D,E

January 1, 2021 No Comments READ MORE +

In a regular server maintenance operation, the purpose of installing a patch on the operating system is?

In a regular server maintenance operation, the purpose of installing a patch on the operating system is?A . To improve server resource usageB . to improve system usabilityC . to enhance system functionalityD . to avoid existing system vulnerabilities being used by some hackersView AnswerAnswer: D

January 1, 2021 No Comments READ MORE +

If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?

If user is using anti-DDOS Pro service, but the original server has rule to limit access to the client IPs, which of the following actions is the most proper one to take?A . enable CDN and change anti-DDOS pro IP to CDN addressB . add anti-DDOS pro IP into customer...

December 31, 2020 No Comments READ MORE +

Which of the following protocols will not be used for a SYN Flood attack?

Which of the following protocols will not be used for a SYN Flood attack?A . UDPB . TCPC . IPX/SPXD . AppleTalkView AnswerAnswer: A,C,D

December 31, 2020 No Comments READ MORE +