Question 6 of 109SQL injection is a security risk that occurs when the content entered by a user is transferred to a server and directly injected into the SQL code for execution.
Correct Answer: A
Question 7 of 109Which of the following parameters can be used as conditions for setting whitelist rules in antivirus protection? (Choose all that apply.)
Correct Answer: A, B, C, D
Question 8 of 109Which type of attack does fingerprint learning defend against?
Correct Answer: B
Question 9 of 109Which of the following statements is incorrect about the characteristics of the TCP/IP protocol stack?
Correct Answer: B
Question 10 of 109DDoS attacks use zombie hosts to send a large number of malicious attack packets to a target. These attack packets congest network links and exhaust system resources, preventing the target from providing services for legitimate users.