Question 6
Which of the following statements about intrusion detection/defense devices are correct? (Multiple Choice)
Question 7
Which of the following description are correct about the principles of HTTP Flood and HTTPS flood attack defense? (Multiple Choice)
Question 8
In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?
Question 9
The IPS process has the following steps:
1. Reorganize application data
2. Match signature
3. Message processing
4. Protocol identification
Which of the following is the correct ordering for the processing?
Question 10
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
