Question 16
Among the following options, which attack is a malformed packet attack based on the TCR protocol?
Question 17
For the basic mode of HTTP Flood Source authentication, which of the following are the correct descriptions? (Multiple choices)
Question 18
UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion.
Which of the following options does not prevent UDP flood attacks?
Which of the following options does not prevent UDP flood attacks?
Question 19
Which of the following options is not a feature of Trojan horses?
Question 20
Which of the following options is not a cyber security threat caused by weak personal security awareness?