Which of the following application vulnerabilities are not as popular as others?
Answer : D
Which of the following statements about VLAN are NOT true?(the number of correct
answers: 3)
Score 1
Answer : A, B, C
Which of the following statements are true for how to login to different ECS operating
system? (the number of correct answers: 2)
Score 1
Answer : A, D
Which of the following statements are NOT true about 'Server Guard' remote logon detection functionality?
Answer : B
In Linux OS, if you want to set a file access privilege to read, write, and execute for the
owner only, what octal number will reflect such settings correctly?
Score 2
Answer : B
CC customized protection rule supports you to define customized configuration setting.
Which of following items can be self-defined? (the number of correct answers: 3)
Answer : B, C, D
From which of the following attacks WAF will not provide protection?
Answer : A