3 Months Free Update
3 Months Free Update
3 Months Free Update
Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?
Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)
The following figure is a schematic diagram of the detection file of the firewall and the sandbox system linkage.
The Web reputation function is enabled on the firewall, and website A is set as a trusted website and website B is set as a suspicious website.
Which of the following statements is correct
What content can be filtered by the content filtering technology of Huawei USG6000 products?
Which of the following options belong to the keyword matching mode? (multiple choice)
When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.
Note to the original link, which of the following options does not belong to the method of re-injection?
Regarding the description of keywords, which of the following is correct? (multiple choice)
If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More
155955cc-666171a2-20fac832-0c042c0420
select)
Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?
1. The Netflow analysis device samples the current network flow;
2. Send a drainage command to the cleaning center;
3. Discover the DDoS attack stream;
4.Netior: analysis equipment sends alarms to ATIC management center
5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;
6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage
7. The cleaning log is sent to the management center to generate a report;
8. The cleaned traffic is sent to the original destination server.
Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules
To detect intrusions in the system. Which of the following is not a feature of misuse detection 2
In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.
And development. Which of the following key points should be done in "things"? (multiple choice)
Regarding the global configuration of file filtering configuration files for Huawei USG6000 products, which of the following descriptions is correct?
When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)
There are several steps in a stored XSS attack
?The attacker hijacks the user session
?The attacker submits an issue containing known JavaScript
?User login
?The user requests the attacker's question 5
?The server responds to the attacker’s JavaScript
? The user's browser sends a session token to the attacker
?The attacker's JavaScript is executed in the user's browser
For the ordering of these steps, which of the following options is correct?
Regarding the processing flow of file filtering, which of the following statements is wrong?
Which of the following are the control items of HTTP behavior?) (multiple choice)
The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall
A True
B. False
Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition
Contains content, the device can block or alert traffic containing specific keywords.
Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)
Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment
Anti-Virus, IPS, spam detection and other equipment.
Regarding the sequence of the mail transmission process, which of the following is correct?
1. The sender PC sends the mail to the designated SMTP Server.
2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail
3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver
4. The recipient sends an email.
Configure the following commands on the Huawei firewall:
[USG] interface G0/0/1
[USG] ip urpf loose allow-defult-route acl 3000
Which of the following options are correct? (multiple choice)
Which of the following behaviors is a false positive of the intrusion detection system?
Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.
Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?
For the description of the Anti DDOS system, which of the following options is correct? C
Which of the following options will not pose a security threat to the network?
If the regular expression is "abc. de", which of the following will not match the regular expression?
Regarding scanning and snooping attacks, which of the following descriptions is wrong?
Which of the following options is not a cyber security threat caused by weak personal security awareness?
Regarding the description of intrusion detection technology, which of the following statements is correct?
Regarding traditional firewalls, which of the following statements are correct? (multiple choice)
For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?
Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)
Based on the anti-virus gateway of streaming scan, which of the following descriptions is wrong?
Which of the following options is correct for the description of the Anti DDoS system configuration?
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Which of the following technologies can achieve content security? (multiple choice)
Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following
What is the content of the intrusion detection knowledge base?