Question 176

Regarding the description of the buffer overflow attack, which of the following options are correct? (Multiple choice)
  • Question 177

    Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*
  • Question 178

    The repair of antivirus software only needs to repair some system files that were accidentally deleted when checking and killing viruses to prevent system crashes.
  • Question 179

    According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
  • Question 180

    In the USG series firewall system view, the device configuration will be restored to the default configuration after the reset saved-configuration command is executed, and it will take effect without other operations.