Which of the following DDoS descriptions are correct?
Answer(s): C,D
What design flaw of TCP/IP protocol does SYN flood attack use?
Answer(s): C
Which of following attacks could serve as a CC attack? (the number of correct answers: 3)
Answer(s): C,D,E
What of the followings will happen if encounter DoS or DDoS attack?
Answer(s): B,C
Post your Comments and Discuss Alibaba ACA-Sec1 exam with other Community members:
Rian commented on October 23, 2024 Good night comment Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ACA-Sec1 content, but please register or login to continue.