Question 36
Which of the following types of attacks are DDoS attacks? 2I
Question 37
Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?
Question 38
The following is a description of black and white lists in spam filtering. Which option is wrong?
Question 39
Which aspects of information security will be caused by unauthorized access? (multiple choice)
Question 40
Which of the following technologies can achieve content security? (Multiple Choice)
