Question 6

Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?
  • Question 7

    Based on the anti-virus gateway of streaming scan, which of the following descriptions is wrong?
  • Question 8

    Which of the following are typical intrusions? "Multiple choice)
  • Question 9

    Which of the following types of attacks are DDoS attacks? 2I
  • Question 10

    An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
    Which of the following is the entry that the firewall will match when looking up the website URL?