Question 6
Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?
Question 7
Based on the anti-virus gateway of streaming scan, which of the following descriptions is wrong?
Question 8
Which of the following are typical intrusions? "Multiple choice)
Question 9
Which of the following types of attacks are DDoS attacks? 2I
Question 10
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
Which of the following is the entry that the firewall will match when looking up the website URL?