A.Input validation(輸入驗(yàn)證) B.Network intrusion detection system(網(wǎng)絡(luò)入侵檢測系統(tǒng)) C.Anomaly-basedHIDS(基于規(guī)則的主機(jī)入侵檢測系統(tǒng)) D.Peer review(同業(yè)互查)
A.DIAMETER B.RADIUS C.TACACS+ D.Kerberos
A.Implement IIS hardening by restricting service accounts.(限制IIS服務(wù)帳號進(jìn)行加固) B.Implement database hardening by applying vendor guidelines.(按照廠商指導(dǎo)手冊加因數(shù)據(jù)庫) C.Implement perimeter firewall rules to restrict access.(細(xì)化邊界防火墻規(guī)則限制訪問) D.Implement OS hardening by applying GPOs.(應(yīng)用組策略對象加固操作系統(tǒng))