Which of the following application vulnerabilities are not as popular as others?
Please list the correct order of the following 4 steps to enable a WAF service : (1) upload
HTTPS CA and private key(HTTPS website only) (2) add the domain name that needs to be
protected (3) select the original IP address (4) add CNAME DNS record
Score 2
Which of the following statements is NOT true about daily operation on server account
andpassword maintenance?
If Server Guard (product provided by Alibaba Cloud) report some brute force password hacking
attacks, the reporting information will include? (the number of correct answers: 3)