Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the followings are not the reasons for a DDoS attack?

A.

Destroying of integrity

B.

Destroying of confidentiality

C.

Destroying of availability

D.

Destroying of business credit

In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the

following statements are true?

Score 2

A.

This file is a text file

B.

The access privilege of this user group is read only

C.

The owner of this file has read/write/execution privilege to this file

D.

Other users (outside of this user group) can execute this file

For internet communication, to setup the connection and data transition between source

and destination, which of the following information you will need? (the number of correct

answers: 3)

Score 1

A.

IP address

B.

Port

C.

Encryption algorism

D.

Protocol

E.

Router Location

Which of the following statements about VLAN are NOT true?(the number of correct

answers: 3)

Score 1

A.

users in different VLAN can connect each other directly without pre-configuration

B.

different VLAN means different physical location of switches

C.

VLAN configuration can be done through an TCP/IP router device

D.

VlAN can enhance the network security and data isolation

Which of the following options is the top 1 web application security risk based on OWASP 2017

report?

A.

XSS Attack

B.

Server Information Theft

C.

Code Execution

D.

SQL Injection

Which of the following protection rules are provided by WAF to better protect from CC

attack? (the number of correct answers: 2)

A.

Loose

B.

Strict

C.

Normal

D.

Emergency

Which of the following statements about IPV6 and IPV4 are true?(the number of correct

answers: 2)

A.

IPV6 has bigger route table size

B.

IPV6 address length upper limit is 128 bits

C.

IPV6 has more simplified header

D.

No network switch device is needed when using IPV6 protocol to transfer data

In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?

A.

Wroute

B.

Route

C.

Tracert

D.

Traceroute

After using WAF, if you find there are many user input data in the network traffic, you should apply:

A.

Loose protection policy

B.

Normal protection policy

C.

Strict protection policy

D.

Progression protection policy

Which of the following methods can't be used against CC attack?

A.

use WAF

B.

change HTTP service to HTTPS service

C.

resolve domain name to a disguised IP

D.

change the service providing port