Which of the following shell command can be used to check disk usage in a Linux OS ECS
Answer : A
Which of following attacks could serve as a CC attack? (the number of correct answers: 3)
Score 1
Answer : C, D, E
From which of the following attacks WAF will not provide protection?
Answer : A
Which of the following protection rules are provided by WAF to better protect from CC
attack? (the number of correct answers: 2)
Answer : A, B
Which of the following statements is true about HTTP protocol?
Score 2
Answer : C
Which of the following protocols is not an application level protocol in ISO/OSI 7 layer
networking model?
Answer : B
Which of following statement about 'Server Guard' Trojan scanning functionality is NOT
correct?
Score 2
Answer : D