Question 6
After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)
Question 7
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
Question 8
Which of the following types of attacks are DDoS attacks? 2I
Question 9
Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?
Question 10
Regarding the anti-spam response code, which of the following statements is wrong?