Which of the followings are not the reasons for a DDoS attack?
In Linux OS, if access control to a file is shown as '-rwxrw-r--' in shell command, which of the
following statements are true?
Score 2
For internet communication, to setup the connection and data transition between source
and destination, which of the following information you will need? (the number of correct
answers: 3)
Score 1
Which of the following statements about VLAN are NOT true?(the number of correct
answers: 3)
Score 1
Which of the following options is the top 1 web application security risk based on OWASP 2017
report?
Which of the following protection rules are provided by WAF to better protect from CC
attack? (the number of correct answers: 2)
Which of the following statements about IPV6 and IPV4 are true?(the number of correct
answers: 2)
In Windows OS which command can be used to track IP route, including involved node and spent time on each hop?
After using WAF, if you find there are many user input data in the network traffic, you should apply:
Which of the following methods can't be used against CC attack?