Question 86

During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
  • Question 87

    Which of the following is the correct configuration idea for the anti-virus strategy?
    1. Load the feature library
    2. Configure security policy and reference AV Profile
    3. Apply and activate the license
    4. Configure AV Profile
    5. Submit
  • Question 88

    Intrusion detection is a kind of network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following belongs to the intrusion detection knowledge base?
  • Question 89

    Which of the following statements about IPS is wrong?
  • Question 90

    Which of the following protocols can be used to construct attack packets for special control packet attacks? (Multiple choices)