Question 16

Among the following options, which attack is a malformed packet attack based on the TCR protocol?
  • Question 17

    For the basic mode of HTTP Flood Source authentication, which of the following are the correct descriptions? (Multiple choices)
  • Question 18

    UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion.
    Which of the following options does not prevent UDP flood attacks?
  • Question 19

    Which of the following options is not a feature of Trojan horses?
  • Question 20

    Which of the following options is not a cyber security threat caused by weak personal security awareness?