{"id":483,"date":"2021-01-11T09:44:04","date_gmt":"2021-01-11T09:44:04","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question476\/"},"modified":"2021-01-11T09:44:04","modified_gmt":"2021-01-11T09:44:04","slug":"certified-cloud-security-professional-ccsp-question476","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question476\/","title":{"rendered":"Certified Cloud Security Professional &#8211; CCSP &#8211; Question476"},"content":{"rendered":"<div class=\"question\">Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like: <br \/><strong><br \/>A.<\/strong> Ransomware <br \/><strong>B.<\/strong> Syn floods <br \/><strong>C.<\/strong> XSS and SQL injection <br \/><strong>D.<\/strong> Password cracking<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nExplanation: WAFs detect how the application interacts with the environment, so they are optimal for detecting and refuting things like SQL injection and XSS. Password cracking, syn floods, and ransomware usually aren\u2019t taking place in the same way as injection and XSS, and they are better addressed with controls at the router and through the use of HIDS, NIDS, and antimalware tools.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like: A. Ransomware B. Syn floods C. XSS and SQL injection D. Password cracking Show Answer Hide Answer Correct Answer: C Explanation: Explanation: WAFs detect how the application interacts with the environment, so they are optimal for detecting and refuting things like [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,479],"class_list":["post-483","post","type-post","status-publish","format-standard","hentry","category-certified-cloud-security-professional-ccsp","tag-certified-cloud-security-professional-ccsp","tag-question-476"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/tags?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}