If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple
choice)
Question No 2
Regarding firewall and IDS, which of the following statements is correct?
Question No 3
Which of the following types of attacks are DDoS attacks? 2I
Question No 4
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to
attack. This kind of zero - day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.
Question No 5
The following figure shows the configuration of the URL filtering configuration file. Regarding the
configuration, which of the following statements is correct?