Which of the following is the core part of the P2DR model?
Correct Answer:
A
Security technology has different methods at different technical levels and areas. Which of the following devices can be used for network layer security protection? (Multiple choice)
Correct Answer:
BCD
Which of the followingdescription about the VGMP protocol is wrong?
Correct Answer:
C
Which of the following attacks is not a malformed message attack?
Correct Answer:
D
Which of the following is not part of the method used in the Detection section of the P2DR model?
Correct Answer:
C