1. CC attacks can cause serious damages. Which of the following statements about CC attack is not correct?
A) CC attack is done on network layer B) The request generated by CC attack is hard to be distinguished from normal requests C) CC attack will simulate real user requests D) Will consume massive sever side resource
2. Which protocol is a 'data link' layer protocol in ISO/OSI 7 layer network model?
A) ARP B) ICMP C) FTP D) UDP
3. Which command in RedHat Linux shell can be used to check disk usage?
A) df B) diskSpace C) diskUsage D) ls
4. Which of the following statements about WAF data risk control feature is NOT true?
A) WAF need to inject JavaScript piece into all pages under the same protected domain name to decide if the client side is worth to trust B) this feature is not suitable for scenario needs to call API directly C) this feature can only used for single page, can't be used to protect the whole domain name D) direct access URL protected by this feature will have slider verification pop out
5. What is the correct action sequence of WAF protection strategy: (1) CC detection (2) Web application attack detection(3) Access control
Leave a comment