Question 96
Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?
Question 97
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
Question 98
Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
Question 99
Which of the following is wrong about intrusion prevention?
Question 100
Buffer overflows, Trojans, backdoor attacks, etc. are all application-level attacks.
