For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
Answer : B, C, D
Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)
Answer : A, C, D
After the user deploys the firewall anti-virus strategy, there is no need to deploy anti-virus software
Answer : B
Which of the following are the control items of HTTP behavior?) (multiple choice)
Answer : A, B, C, D
An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?
Answer : B
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
Answer : B
Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?
Answer : C