DRAG DROP Match each of the following application layer service protocols with the correct transport layer protocols and port numbers.
Answer:
Explanation:
Question No 2
Which of the following attack methods is to construct special SQL statements and submit sensitive
information to exploit program vulnerabilities
Question No 3
A Web server is deployed in an enterprise intranet to provide Web access services to Internet users,
and in order to protect the access security of the server, it should be divided into the _____ area of
the firewall.
Question No 4
At what layer does packet filtering technology in the firewall filter packets?
Question No 5
As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long time to test the network connectivity and stability.