• The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • For example, in the simplest case, network sniffing is used to obtain passwords, and those passwords are then used to mount an application-level attack.

    例如简单的情况中网络嗅探能够用于获取密码然后这些密码可以用于进行应用级攻击。

    youdao

  • For example, in the simplest case, network sniffing is used to obtain passwords, and those passwords are then used to mount an application-level attack.

    例如简单的情况中网络嗅探能够用于获取密码然后这些密码可以用于进行应用级攻击。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定