本站已运行

攻城狮论坛

xinmeng

作者: no1speed
查看: 168|回复: 39

主题标签Tag

more +今日重磅推荐Recommend No.1

所有IT类厂商认证考试题库下载所有IT类厂商认证考试题库下载

more +随机图赏Gallery

重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)重量级~~30多套JAVA就业班全套 视频教程(请尽快下载,链接失效后不补)
【超过几百G】EVE 国内和国外镜像 全有了 百度群分享【超过几百G】EVE 国内和国外镜像 全有了 百度群分享
某linux大佬,积累多年的电子书(约300本)某linux大佬,积累多年的电子书(约300本)
乾颐堂现任明教教主Python完整版乾颐堂现任明教教主Python完整版
乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018-2019年 最新31-50期合集视频(各种最新技术杂谈视频)
Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天Python学习视频 0起点视频 入门到项目实战篇 Python3.5.2视频教程 共847集 能学102天
约21套Python视频合集 核心基础视频教程(共310G,已压缩)约21套Python视频合集 核心基础视频教程(共310G,已压缩)
最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程最新20180811录制 IT爱好者-清风羽毛 - 网络安全IPSec VPN实验指南视频教程
最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器最新20180807录制EVE开机自启动虚拟路由器并桥接物理网卡充当思科路由器
最新2018/07/29录制 IT爱好者清风羽毛-Cisco IOS ZBF防火墙视频最新2018/07/29录制 IT爱好者清风羽毛-Cisco IOS ZBF防火墙视频
乾颐堂 教主技术进化论 2018年 最新1-30期合集视频(各种最新技术杂谈视频)乾颐堂 教主技术进化论 2018年 最新1-30期合集视频(各种最新技术杂谈视频)
Cisco CCW售前销售报价系统使用方法Cisco commerce workspaceCisco CCW售前销售报价系统使用方法Cisco commerce workspace

[电脑技巧] PSE - Endpoint Questions

  [复制链接]
查看: 168|回复: 39
开通VIP 免金币+免回帖+批量下载+无广告
Save your time  to pass
3 `, {! {6 E* T5 \: x% U
% y3 W5 V* p1 `' l5 [5 `
2 L+ t" {5 `. \- ~0 l7 @! s Question 2 of 18.  [F]" D* p) P! }. b6 j& W9 |
True or false? Traps Local Analysis capability is based on a signature database maintained on the endpoint system and regularly updated by WildFire.& c: I0 n+ a6 P
True
! j7 H; E) L5 R& i  False
7 w% Z2 E2 R9 D1 R- N, h2 \  2 H* B9 n" E3 N' E+ C: n
Mark for follow up
3 P  J- \* V: u; |; @
0 _+ o3 q4 G! H, h
: b2 N( G" S2 R  G! b( e Question 13 of 18.  [T]" U% w/ A# v, f+ J
True or false? An executable’s hash verdict from WildFire can be overridden to mark the hash as Malicious or Benign for the local domain.
) [0 \4 L6 b/ |True( Q7 U/ W( \5 i# i: E
  False/ P! o- q- x6 \& C" n# J
  4 [! Y: m, @( I
Mark for follow up
! u$ r. z# r2 f( g& U0 [5 _' H3 E/ S# |# x: F+ q6 l, I

6 W# B% ^( B9 V8 U( g# s; l Question 10 of 18.  [F]
4 ?/ t& C: ?' q9 T0 s7 ]  M4 yTrue or false? Traps must be sold in conjunction with Palo Alto Networks next-generation firewall products and cannot be sold separately.
! h# j1 G. A$ Q: Y4 CTrue
) M' b* I% A5 k6 R  False
2 q. D- o$ d5 O5 n) f  
8 C- `( X4 o) U+ I- U2 v9 `/ h Mark for follow up
  l1 g; V/ G  p
2 W$ E! R( x" C4 D* pQuestion 10 of 18.  [A]
) m& d7 [0 R& ^% E* `" ?How does Traps complement Palo Alto Networks perimeter protection?/ s" U% n2 ^4 l9 ]! F+ T6 \
  Endpoints sometimes are operated by their users outside the corporate network perimeter.
! k- @+ D& ?. M6 q
8 E& H& U1 M$ s' p
( z. [8 [$ f5 r1 l1 r" l
* |6 c7 t" l* p" Y  Information about threats is uploaded into Traps agents.; l* H: N, v! J4 `8 X3 q
  Traps endpoints send signatures about threats directly to Palo Alto Networks firewalls., w/ `# l) ]% @
  ESM Servers send hashes of files directly to Palo Alto Networks firewalls.
, a" i, [. L6 T9 ~: Z! @ Mark for follow up* Q  t5 d% s2 q& y
5 Q: s9 W# V0 n# T# Q3 v. q

! ^4 `! s! Z5 T" w# d, l$ s9 y1 f0 vQuestion 9 of 18.  [A]
' l: K, b! Q* x7 a4 IWhich licenses or subscriptions are required for a Traps deployment?- N/ [9 `2 H- h5 }6 ]  B( I. F0 G' Y
  one license for all endpoints to be protected (workstations, servers, and VDI)/ U2 c- e. l9 `1 L% q# l* K0 E

5 `+ a6 G7 O5 K% l0 T - Z# _) @% ~5 `

, Q( `* r4 e+ f0 P+ T  separate licenses for workstations, servers, and VDI
" c# T4 D8 _2 L0 t7 \' ~7 u* Z2 G  WildFire subscription
- I+ U* z: [. k" n7 M$ N6 f, i  perpetual ESM Server license
! k) H0 k. s- P/ U6 y Mark for follow up
$ W6 z& U# l+ T
; c3 T' o4 G: ]7 ~8 J1 P' `6 o2 c
% S7 G8 }8 E% h+ p- H+ n; _Question 8 of 18.  [A]' v  w& t7 p0 X# @
What is the HTTP address for the Cloud Services Portal?* V4 |. n; A$ r6 i( b  L- r$ `% L* _
  https://apps.paloaltonetworks.com
) L8 n* G# W' i3 X) }, n( z& [  ^  h) k  https://portal.paloaltonetworks.com
9 t' k$ K8 `6 O  https://csp.paloaltonetworks.com
2 r* B* z; c% u% l3 J  https://services.paloaltonetworks.com
' r- J7 ?- }' u3 R. {$ {% l+ O Mark for follow up
- B' _3 L' q8 w* v9 f, J! w
$ L) }$ E. C! d) [
8 k, s' `( \9 ?5 UQuestion 6 of 18.  [A]; x1 m' N$ e( p8 K
Which endpoint solution type most accurately describes Traps?
. S/ Z" W; w9 K- M! x, C8 P  Prevention Solution) L" B' N3 d+ k* f
  Detection and Response Solution1 {$ M' [+ B7 X) x8 e
  Remediation Solution
8 u6 K: z/ E" u6 T  J* O- p" D  Endpoint Management Solution
* d- c9 g9 x, A2 J9 H8 S Mark for follow up! I- C2 J5 x# H; }& Z
2 \9 w* {  O: e' O' ~

% P/ [9 E% x1 e; [Question 5 of 18.  [A]
! M7 z1 n& n6 E, |: UWhich statement is true regarding Traps Execution Restrictions?! W+ H+ n3 o+ u: h! n: S
  They limit the attack surface of an endpoint by defining where and how users can run executable files.: ?8 y% T' Z2 u  R3 O8 \0 f

1 D% v! w6 _' C4 @' _! e9 o0 `
& V( [$ ]& F( W6 y  z  ]
# r! C3 J0 L: y* n  They are used to specify which EPMs will be applied to a given process.2 Q6 M7 S# @) ?3 x6 y
  They are used to blacklist or whitelist files for further MPM processing.
8 d8 g0 `# u0 f1 t* _  They are included in regular content updates.) }' K) n; f$ }: h& _# T
Mark for follow up
. G& v8 Y# i3 A+ q0 f8 c7 t+ W5 [( N' S0 |4 m+ G2 ^
$ v8 z/ y4 `* H. ]4 P6 c
Question 18 of 18.  [A]+ R3 |: v& f4 S4 o2 T
Which statement is true regarding Traps Management Service Security Event logs?
) u( R" P+ \+ E5 V: M, N  Logs are generated by the protection modules when threats occur on endpoints.
& S: i. D8 O& {6 w! ~" m$ ]  Record status of all log files is collected by the Traps management service.
. G: c2 q/ H& c+ q  Log system events are reported by the Traps agent.% L* C9 x$ H" K1 {+ p& W5 n
  Record configuration, policy, and system events are reported by the Traps management service.3 S0 S1 b; O0 ^' c. L" F
Mark for follow up
- i! t' L, F- w7 U9 u% o: d" y; f) b" ]. i5 p

  z0 c* ?/ g- h5 F! g5 }1 z( pQuestion 11 of 18.  [A]0 T1 `% J) T- C5 l% ?3 O
True or false? WildFire detects malware using both static analysis and dynamic analysis mechanisms.
1 X7 w- @. H/ s& Z* ATrue' K; B+ ~' @4 L' E" u
  False
" c  I+ {4 A  X* }' E" p% D  4 f2 H! _$ {$ ~5 l1 {7 c
Mark for follow up% j: ~- V( _0 p6 W2 q% J6 [

6 W% y( h; |* _
$ M$ ], P) t2 n5 L5 t9 i' CQuestion 8 of 18. [A], R/ o) e: T& @- z0 Z* s  C8 u) ^
Which Palo Alto Networks cloud service is used by the Traps management service?  D2 l& q. `! S  ~6 r
  Directory Sync Service
5 @1 m' K8 Y8 x' n+ ^( k  F  Domain Name Service3 U4 j5 p7 O. u$ L4 E2 O4 x: G: V
  Reporting Service* i$ G: S1 `0 i3 n  O1 C
  Magnifier Service
; J3 D& w8 m  F2 I7 V+ l$ a Mark for follow up
5 d! [" j/ C- K9 B% q9 ^/ a
% ~  q/ ]% A+ X. r0 g) @- {
9 v  H/ e+ V4 @% GQuestion 13 of 18.  [A]
! p3 [! z3 Z. k7 B2 [Which statement is true regarding scanning in the Traps Management Service?4 A0 G4 F/ G8 t- Y9 o. I/ K
  It helps companies obtain regulatory compliance.
. I& G$ u+ r) x) ^$ M7 u  It is a protection and prevention feature.; B! m3 ]9 v) W
  It supports macOS endpoints only.3 y+ G0 L6 d% c4 z
  It is supported by all agent types.4 |4 D: X0 V) p* _; j+ ]
Mark for follow up
0 |% K* z0 b/ @9 t
$ ~* \: D& y: p; ~6 K# C0 n; Q6 u
Question 17 of 18.  [AB]0 `- v, p1 P% i" J8 R: I
Which two attack vector locations can Traps protect? (Choose two.)& p6 {. h0 I8 c( _- `
  data center servers, v/ h1 I; n' J$ l8 Z
  end-user workstations
' X6 X/ j( {: u% \, I  internet perimeter firewall* ?! n8 [0 I' Z4 I- P, p
  branch office firewall, x5 J# S. {; r1 i1 I. t$ }
Mark for follow up& L! F  T+ x* ?: l& L, B$ b6 @
! n3 t, |9 W. W" y5 _3 \% M

( f2 Z/ z* h0 cQuestion 5 of 18.  [A]
# X% Y, {4 m& ?* m( @" ~2 E4 [True or false? Traps can be positioned as a replacement for traditional antivirus.
' ]2 ]& s# {# D# D' fTrue  n1 n, L* G9 R# C' Y# H) E
  False. q8 q" `' p; ^9 P! h+ Y# w
  
: M# H& B/ q/ B, [ Mark for follow up3 }& n7 E/ B) Y; o0 @' {

/ O& O7 j: X, x: Y9 L* r
- g& w' j+ ?. F  y8 BQuestion 9 of 18.  [AB]
' ]" `5 q5 L+ y' `- ^% u% I  ^Which two locations can Traps forward logs? (Choose two.)
! ?& u9 O1 l6 }: I4 p/ k  syslog server' S+ \. T, u) ]! @
  Panorama
2 C8 e% p: l: i1 @  next-generation firewall1 I! p* d& P" u$ Q( ]  D
  FTP server& D* o- I- y& Y, `# d1 j
  SNMP Trap
8 i* S$ L) k6 q/ E Mark for follow up
& g3 }8 Y$ c; _  }) r& @4 l$ x6 h0 `  Q; U# g
Question 15 of 18.  [ABC]# B6 w7 \: U- S" g# _, R4 A8 J* _
Which three file types can be sent by Traps to WildFire for malware analysis? (Choose three.)
" F& ^; S7 F. o& q+ s1 W: S  Mach--O files (Mach--o) for macOS
# M6 c5 b/ F0 ^' d5 u: k- c  Excel and Word documents containing macros
! ]8 `  {7 }8 `/ x+ M& M  @  any executable file' A. z; B3 P) q+ @) ~, z! }- L& x
  Adobe Flash files6 [8 T- e- N6 p" @, q, ]
Mark for follow up
, \) p, I. x# B
- C5 @. V  B) [! l+ gQuestion 17 of 18.  [ABC]
! L' U( E- A* B$ F8 D6 TWhich three options are Traps differentiators? (Choose three.)
# N- G8 B) b5 T9 E+ B  automatic conversion of threat intelligence into prevention1 ~) P6 T! z( z# E+ e+ q
  multi--method prevention
2 y/ E( O3 l+ z4 a  persistent protection
* L) r7 E" u) l  w& i& {  w  proactive patching for servers and endpoints: q% U  q4 u3 s. F& ^1 N
Mark for follow up
. ?* r' y3 H$ {( O# [0 n" a! q$ [6 i) I5 M
Question 13 of 18.  [A]! Q* m. u) W& h; h0 L+ c' F8 v
Which statement is true regarding Traps process protection?
- p& _# T- Z9 Y5 s# `$ C  Traps protects no processes by default. All processes to be protected must be defined by an administrator.
0 Z( k7 P+ Z2 q" W" Z2 j5 Z' e4 P' ^
. V& W/ ?2 }% T: K6 t4 Z4 U5 @0 w

: c! Q+ I: |4 w4 e  Traps protects more than 100 different Windows Processes and more than 50 different Mac processes. Additional processes can be protected based on administrative configuration and settings tuned to the customer’s production environment.1 o6 ?) F7 r1 X9 C, f: G. o
  Traps protects more than 100 different Windows Processes and more than 50 different Mac processes. No additional processes can be protected.
$ W% {- u( v6 f  Y  By default, Traps protects every process running on an endpoint.
7 B3 |! p4 O- U' D/ G Mark for follow up
* q% `8 ]- u) S& S& l& T( U# Q, C% @- }. d) E# h
Question 6 of 18.  [A]
, f& w1 N# O/ @; w5 xWhich activity should not be highlighted during a Traps demonstration?6 q. D. R& |" g0 x
  disabling or deleting the Traps agent
' s& q) c' X: T2 a/ J, N- K  viewing prevention events in the Traps management service web interface
8 N- H1 D$ A/ z" `& Q( n  Traps multi--method prevention of malware, o+ D* _8 E6 `' K
  exploit technique prevention by Traps EPMs
3 a( O, ]- C  W! } Mark for follow up' h* t! N1 d  |+ M  S' y7 B* o
; `4 u" n, O, v. g2 |! y* C
Question 6 of 18.  [A]
, h& q, F( Y7 V. @7 ~' u+ v  u7 }In the Traps management service, which exception type is not valid?
0 z4 g' K+ Y$ J+ D" l  Administrator Exception$ u- U/ A* X! g9 c' b% G
  Support Exception/ C; w. z8 S* G" _% v
  Hash Exception! u4 S4 Z2 U2 w$ E7 J
  Process Exception6 H% C- M: a) \$ T' u8 F4 H2 w( W
Mark for follow up) u6 e' z/ j$ ]  q, n) Q
. z5 O9 `% n+ S# }+ ^  Y
Question 11 of 18.  [A]
+ P$ r) {: _6 g3 K! yWhich statement is true about advanced cyberthreats?
* ^: t8 ]7 i( k# a. U  A zero--day vulnerability is defined as a security flaw of which the vulnerable product's vendor has no prior awareness.! t0 J1 i% {  ^
0 M$ W$ G3 \, Q  f8 y( V, W/ P

' N! r. C& J) i/ K1 E( e
/ r9 A% r8 M! D5 i( |  A zero--day vulnerability is defined as a security flaw of which the vulnerable product's customers have no prior awareness.
* E. w$ ]3 n; |% `# b$ a# B- Y  Zero-day attacks are unstoppable.# S8 R. f8 a( u) Q3 O9 s2 f* E
  Protection against zero-day attacks is impractical.3 D& L, }' W3 c$ W# S' T, C
Mark for follow up6 h' h' O9 d/ b! q6 m! H
+ a! k0 g1 i) I6 ^" b9 r
Question 18 of 18.  [A]5 F- o9 j9 g( h3 b
When an executable is being evaluated by a Traps malware prevention process, what are restriction rules used for?0 p1 [8 w+ K4 N% s1 }% K8 ?0 W
  restrict where and how users can run executable files
" i3 H" i. H6 H  restrict the information displayed to users when the Traps agent blocks an exploit, @7 R: ~  R+ f0 C# d4 v. r, G
  restrict which processes will be protected by EPMs8 g+ O" c8 t" E
  restrict which administrators can set policies
# D( h* u8 Y0 n Mark for follow up6 g0 s$ [0 O7 P) I
( b/ }" w- a! E* f8 x3 g/ _, i
Question 12 of 18. [A]
$ F1 }: C0 N- X7 l6 bWhat does Traps use to stop an exploit technique?$ s  g9 E: A, n6 I2 @' G
  exploit protection modules (EPMs)2 Z3 Z% C% p5 D: ]2 p" }0 k
  malware protection modules (MPMs)/ D* D( l" ~( M$ c: s
  memory corruption4 s1 S8 V' C1 D0 ?8 O/ Q6 c% h  a
  logic flaws  \2 e, E. W) v# S
Mark for follow up
# x: M) L6 ^* ]. z/ T  r/ t- T0 y) @
Question 16 of 18.  [A]  S7 `. L2 u$ k* m5 a
How many exploit techniques must be prevented to stop a successful attack?% [- }7 W5 ^4 y
  1
9 W; T5 f5 @. ~$ ?  2
) S9 v2 D  \9 `  3
6 B- `1 p" U% G4 j/ Q& {) U  all of the techniques) G: T. e/ |" S. z* ^
Mark for follow up
6 Q/ j6 R0 ], |1 W" J; ~' Z1 z  y$ p7 E$ V9 G
Question 4 of 18. [A]
* N4 O0 A, v6 _& BWhich statement is true about the malware protection flow?4 \4 U" B% P! p3 j; z, o
  A trusted signed file is locally exempt from WildFire analysis and Local Analysis.8 t, i4 o' j7 c' I8 A; C8 @7 Y
  N% X, {7 e: H5 u( w& X+ m

/ K9 r# b! E8 p) q. }7 ?! l6 R2 B! ?0 B% p  J) }( A2 m
  Child process MPM policy is the last step of the malware protection flow.
& L' F6 I) L( Q" e( w9 ~: G" ^  A% x  Administrative hash control is evaluated after local static analysis.
: n  Z' i$ S' a0 J  Local static analysis occurs before a WildFire verdict check.
2 O# K# A. X' \: a Mark for follow up
1 m2 Y2 s+ G  N/ `$ O; Y  M! Z4 P' x4 [, b) J6 O9 B
Question 5 of 18.  [A]
  u% W: q1 _; O$ n; sContent updates do not include which item?
+ B" x% S0 P& m  J. D  new EPMs
) E: J+ `: G+ n$ Q) L% |# `% ]  updates to the Local Analysis model) d% D* v; T9 W" {! Z* ~
  new trusted publishers3 P6 F8 C) |1 j
  new default policy rules9 X2 V/ [3 F: n
Mark for follow up
4 U5 b6 I/ f) ?2 H* X; z) F6 q/ N: n! `2 U, m' n) I" j
Question 4 of 18.  [A]
. f$ J* b! l9 n. N# r" [8 AWhich option is not a category of an exploit technique?
3 A  G; G$ B  B3 r1 @  stack canary exploitation techniques, such as CVE-2012-1313
  N0 t- F! h. r( l  i6 S0 {  logic flaw techniques, such as malicious code masquerading as a variable
6 j2 f! A4 ?  X! Z; o4 e3 L  memory corruption techniques, such as Heap Spray and ROP Chain8 K5 N3 d! \6 x* q6 O* l5 j
  code execution techniques, such as malicious code embedded in application data files1 l5 ^" s+ t, }4 U" i
Mark for follow up
% a/ g# X. z7 M" a8 D3 C6 C
& y; F) C. a; J/ a3 a! c$ D8 |2 s) s& _9 z, n
Question 6 of 18.  [D]7 i7 ^" n6 u) s. ?
How much logging storage comes with the Traps management service?! N! |/ x, N/ ]& D1 \$ }& A
  10TB5 v$ j- s" d3 p  O+ N
  100TB
6 H5 U' `! P3 J  None. The Logging Service is a paid service.
' Y1 d' d! |8 e  100GB
4 {# e9 V6 D/ \3 R Mark for follow up
. G9 [0 R7 J$ j3 T0 g7 I; T* O8 w: t, I: U5 E1 t
Question 16 of 18.  [A]
4 o' e  l5 Y) JWhich statement is true about file hashes?
9 m  z1 N! v) X- x; ~! X* W# I  The Traps agent caches the hashes of executable files for which it has verdicts.
3 X  ^0 e3 v# e  O' n  Each day WildFire automatically updates the ESM Server's cache with hashes of files known from other customers.! p/ x  p0 ~5 ^6 Q9 |: U
  ESM Servers send hashes of PDF files to WildFire./ C5 F% \" c- c0 {9 \" y- R
  ESM Servers send hashes of PDF files and MS Office files to the local cache folder.
, _7 N, @7 J+ A4 l7 R Mark for follow up6 X/ g' b0 g- m" Y& m7 d4 L

( @/ F4 p% V6 k  S' rQuestion 17 of 18.  [C]
" i# e% l$ l$ @) X5 x0 \2 ~How often does WildFire send verdict updates to the Traps management service?7 e- q, O) b; M' ~" H+ T
  every 5 minutes
2 g& \/ Z  S) b  every 24 hours
0 G- R7 U! B8 N$ n7 v  every 8 hours
4 O: B, U: I. E1 s  every 1 hour
' w8 P0 g" D: s5 G9 V1 U/ j Mark for follow up5 T0 x" m" r1 I5 P2 _
' k( q4 ]' M! X! v
Question 5 of 18.  [A]* Y" V. J5 D3 O5 _3 p8 I
When a security event occurs, which Traps component captures forensic information about the event?" ?* p' h( ]! R, D' H- E' U9 r& o
  Traps agent
2 K3 L' X9 L3 o2 N, w+ P, ]$ T  NGFW Database0 x) y7 j- g! D6 a
  Traps Management Server
5 S8 c& v2 b$ C  |; u5 C8 Z4 j$ z/ v  Traps Management Server Console
" c4 F5 k/ Z3 Y0 ?6 C5 A. L Mark for follow up
# s9 e6 W; i3 k* H# y" b0 X; B* \# Y
Question 11 of 18.  [A]5 _3 j2 B5 |+ c; n& S; @" P  o
What does the term "Service Protection" mean?8 O: ^% ^5 k( T
  The Traps agent is tamper-proof.3 L- X8 t  [: x+ m
  A specified process is protected.
0 d  c3 b0 @8 f2 W* S6 k4 W: m1 b  The process running on a Windows Server system is protected.
' w/ v# K" G  `) v8 \  One Traps Management Server can take over for another.
. G' {; l5 ?8 r1 q Mark for follow up
4 |, C4 \  U4 G# F# z" ~" H) P3 S. l
' H0 b# a( k: j, r
- x/ @- y! X: A# b& S) ~: F* U& P
- h# Q9 H$ E; g+ ^$ I+ c----------------------------------
2 N2 X" {0 C3 H8 u6 d; u. R4 J3 [  ?) j" R
8 ]4 [- @& G. I- M. A
Question 7 of 18.
( v$ R8 W& f# r2 e$ {. `Which two statements describe characteristics of malware executable files? (Choose two.)
: x/ ^* U+ }# H, A( D  It can take the form of executable code or scripts.! O9 ~  m$ g3 C% B7 K" Z& J4 r& X
  It is contained in an application data file such as a PDF, JPEG, or HTML file.
. M  f, P8 @/ l  It has malicious intent, acting against the interest of the computer user, K: e# K  B. u
  It relies on a legitimate application reading it.8 s2 H: z% @2 V+ e
Mark for follow up
7 l5 z$ \3 \" ]  ^( q+ D, @6 [1 T$ i; ^9 J3 ^; K+ L4 w+ K! j: Y

: G) B; u2 e0 h" ?4 lUnder Creative Commons License: Attribution Non-Commercial
CCNA考试 官方正规报名 仅需1500元
回复 论坛版权

使用道具 举报

zhjyfe [Lv5 不断成长] 发表于 2020-5-8 08:41:24 | 显示全部楼层
新整理的学习资料,大家快来领取吧!
回复 支持 1 反对 0

使用道具 举报

monkeyman [Lv10 举世无双] 发表于 2020-5-6 16:08:08 | 显示全部楼层
非常感谢楼主分享资源呀
回复 支持 1 反对 0

使用道具 举报

monkeyman [Lv10 举世无双] 发表于 2020-5-5 20:07:53 | 显示全部楼层
非常感谢楼主分享资源呀
回复 支持 1 反对 0

使用道具 举报

monkeyman [Lv10 举世无双] 发表于 2020-5-3 12:38:06 | 显示全部楼层
非常感谢楼主分享资源呀
回复 支持 1 反对 0

使用道具 举报

monkeyman [Lv10 举世无双] 发表于 2020-5-4 17:43:48 | 显示全部楼层
非常感谢楼主分享资源呀
回复 支持 1 反对 0

使用道具 举报

monkeyman [Lv10 举世无双] 发表于 2020-5-7 15:25:49 | 显示全部楼层
非常感谢楼主分享资源呀
回复 支持 反对

使用道具 举报

zhjyfe [Lv5 不断成长] 发表于 2020-5-9 16:07:00 | 显示全部楼层
谢谢分享,楼主辛苦了
回复 支持 反对

使用道具 举报

monkeyman [Lv10 举世无双] 发表于 2020-5-9 22:06:40 | 显示全部楼层
非常感谢楼主分享资源呀
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

QQ|无图浏览|手机版|网站地图|攻城狮论坛

GMT+8, 2020-5-26 01:49 , Processed in 0.281419 second(s), 20 queries , Gzip On, Memcache On.

Powered by Discuz! X3.2 © 2001-2013 Comsenz Inc.

Designed by ARTERY.cn