Question 76
Huawei USG6000 product can virus scan and process certain file transfer protocols, but which of the following protocol does not include?
Question 77
For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?
Question 78
Which of the following is wrong about the 3 types of abnormalities in the file type recognition result?
Question 79
Malicious code usually uses RootKit technology to hide itself. RootKit modifies the kernel of the system by loading special drivers to hide itself and specific files.
Question 80
In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth, Consume equipment resources?