3 Months Free Update
3 Months Free Update
3 Months Free Update
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)
If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses
It is the stream scanning method.
For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)
A ICMP protocol
B. UDP protocol
C. CIP protocol
D. FTP protocol
Regarding the sequence of the mail transmission process, which of the following is correct?
1. The sender PC sends the mail to the designated SMTP Server.
2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail
3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver
4. The recipient sends an email.
The following commands are configured on the Huawei firewall:
[USG] firewall defend ip-fragment enable
Which of the following situations will be recorded as an offensive behavior? (multiple choice)
The administrator has made the following configuration:
1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
2. The action of overwriting signature ID3000 is an alarm.
The configuration command to enable the attack prevention function is as follows; n
[FW] anti-ddos syn-flood source-detect
[FW] anti-ddos udp-flood dynamic-fingerprint-learn
[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn
[FW] anti-ddos http-flood defend alert-rate 2000
[Fwj anti-ddos htp-flood source-detect mode basic
Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)
Regarding intrusion prevention, which of the following option descriptions is wrong
Which is correct about the following Policy Center troubleshooting process?
Which of the following options is not a defense against HTTP Flood attacks?
Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)
Which of the following are the control items of HTTP behavior?) (multiple choice)
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.
And development. Which of the following key points should be done in "things"? (multiple choice)