Question 86
During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
Question 87
Which of the following is the correct configuration idea for the anti-virus strategy?
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
Question 88
Intrusion detection is a kind of network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following belongs to the intrusion detection knowledge base?
Question 89
Which of the following statements about IPS is wrong?
Question 90
Which of the following protocols can be used to construct attack packets for special control packet attacks? (Multiple choices)