Which of the following statements about cloud security shared responsibilities model are true? (the
number of correct answers: 2)
Answer : C, D
Which directory is the home directory of root user?
Answer : C
Which of the following DDoS descriptions are correct?
Answer : C, D
What of the followings will happen if encounter DoS or DDoS attack?
Answer : B, C
Which of the followings are not the reasons for a DDoS attack?
Answer : A, B, D
18.in RedHat Linux shell which command can be used to check what file system is mounted and form what disk device it was done?
Answer : D
Which of the following Keys in HTTP heads are related to cache control? (the number of correct answers: 3)
Answer : C, E