Question 76
UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion.
Which of the following options does not prevent UDP flood attacks?
Question 77
IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?
Question 78
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
Question 79
Fraggle attack means that both the source address and the destination address of TCP are set to the IP address of a victim. This behavior will cause the victim to send a SYN-ACK message to its own address, which in turn sends back an ACK message and creates an empty connection, causing the system resources to be occupied or the destination host to crash.
Question 80
Regarding the processing flow of file filtering, which of the following statements is wrong?
