Which of the following scenarios should be handled by anti-DDOS service? (the number of
correct answers: 3)
Which of the following logs can be accessed through ECS logs provided by Alibaba Cloud?
(the number of correct answers: 2)
Which of the following statements about 'webshell' detection feature of WAF is NOT true?
Which command in RedHat Linux shell can be used to check disk usage?