Question 6 of 109
SQL injection is a security risk that occurs when the content entered by a user is transferred to a server and directly injected into the SQL code for execution.
Correct Answer: A

Question 7 of 109
Which of the following parameters can be used as conditions for setting whitelist rules in antivirus protection? (Choose all that apply.)
Correct Answer: A, B, C, D

Question 8 of 109
Which type of attack does fingerprint learning defend against?
Correct Answer: B

Question 9 of 109
Which of the following statements is incorrect about the characteristics of the TCP/IP protocol stack?
Correct Answer: B

Question 10 of 109
DDoS attacks use zombie hosts to send a large number of malicious attack packets to a target. These attack packets congest network links and exhaust system resources, preventing the target from providing services for legitimate users.
Correct Answer: A