Question 176
Regarding the description of the buffer overflow attack, which of the following options are correct? (Multiple choice)
Question 177
Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*
Question 178
The repair of antivirus software only needs to repair some system files that were accidentally deleted when checking and killing viruses to prevent system crashes.
Question 179
According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
Question 180
In the USG series firewall system view, the device configuration will be restored to the default configuration after the reset saved-configuration command is executed, and it will take effect without other operations.