D-SF-A-24 無料問題集「EMC Dell Security Foundations Achievement」
In the cloud, there are numerous configuration options for the services provided. If not properly set, these configurations can leave the environment in an unsecure state where an attacker can read and modify the transmitted data packets and send their own requests to the client.
Which types of attack enable an attacker to read and modify the transmitted data packets and send their own requests to the client?
Which types of attack enable an attacker to read and modify the transmitted data packets and send their own requests to the client?
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)