Which of the following is not misuse detection feature?

Misuse detection discovers intrusion activity in system by detecting similar behaviors of user intrusions, or by detecting violations of system security rules indirectly by exploiting system flaws. Which of the following is not misuse detection feature?A . Easy to implementB . Accurate detectionC . Effective detection of impersonation of legitimate...

November 4, 2018 No Comments READ MORE +

During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?

During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?A . Long-term latency and key data collection.B . Leaks key data information to interested third parties.C . By phishing emails, attachments carrying a 0day vulnerability cause the user's terminal to become a...

October 20, 2018 No Comments READ MORE +

The whitelist rule of the firewall antivirus module is configured as *example*. Which of the following matches is used in this configuration?

The whitelist rule of the firewall antivirus module is configured as *example*. Which of the following matches is used in this configuration?A . Prefix matchingB . Suffix matchingC . Keyword matchingD . exact matchView AnswerAnswer: C

September 25, 2018 No Comments READ MORE +

Which of the following attack types is DDoS attack?

Which of the following attack types is DDoS attack?A . Single package attackB . Traffic attackC . Malformed packet attackD . Snooping scanning attackView AnswerAnswer: B

September 11, 2018 No Comments READ MORE +

About firewalls and IDS, which of the following is true?

About firewalls and IDS, which of the following is true?A . Firewall is a bypass device for fine-grained detectionB . IDS is a straight-path device and can't perform depth detectionC . Firewall is unable to detect insider malicious operation or misoperationD . IDS can't interact with the firewallView AnswerAnswer: C

August 29, 2018 No Comments READ MORE +

Which of the following options does not prevent UDP flood attacks?

UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion. Which of the following options does not prevent UDP flood attacks?A . UDP fingerprint...

August 29, 2018 No Comments READ MORE +

Which of the following attacks are belong to attacks against Web servers? (Multiple choices)

Which of the following attacks are belong to attacks against Web servers? (Multiple choices)A . Website fishing fraudB . Website TrojanC . SQL injectionD . Cross-site scripting attacksView AnswerAnswer: CD

August 26, 2018 No Comments READ MORE +