Question 6 of 261

SQL injection is a security risk that occurs when the content entered by a user is transferred to a server and directly injected into the SQL code for execution.

Answer

Suggested Answer

The suggested answer is A.

Question 7 of 261

Which of the following parameters can be used as conditions for setting whitelist rules in antivirus protection? (Choose all that apply.)

Answer

Suggested Answer

The suggested answer is A, B, C, D.

Question 8 of 261

Which type of attack does fingerprint learning defend against?

Answer

Suggested Answer

The suggested answer is B.

Question 9 of 261

Which of the following statements is incorrect about the characteristics of the TCP/IP protocol stack?

Answer

Suggested Answer

The suggested answer is B.

Question 10 of 261

DDoS attacks use zombie hosts to send a large number of malicious attack packets to a target. These attack packets congest network links and exhaust system resources, preventing the target from providing services for legitimate users.

Answer

Suggested Answer

The suggested answer is A.