Question 11
Which of the followings are not the reasons for a DDoS attack?
Question 12
Which of the following scenarios are suitable to use CC emergency mode protection? (the number of correct answers: 2)
Question 13
Which of the following statements about 'webshell' detection feature of WAF is NOT true?
Question 14
A DoS attack that sends a flood of synchronization (SYN) requests and never sends the final acknowledgement (ACK) is typically known as which of the following?
Question 15
Which of the following scenarios can be considered as business fraud? (the number of correct answers: 2)