3 Months Free Update
3 Months Free Update
3 Months Free Update
Regarding the processing process of file overwhelming, which of the following statements is correct?
The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping website during working hours. So a URL filtering configuration file is configured to divide the predefined
The shopping website in the category is selected as blocked. But employee A can still use the company's network to shop online during lunch break. Then what are the following possible reasons
some?
The administrator has made the following configuration:
1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
2. The action of overwriting signature ID3000 is an alarm.
For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.
Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment
Anti-Virus, IPS, spam detection and other equipment.
File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?
An enterprise has 3 server, which is the most reasonable plan when deploy Policy Center system
planning?
Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?
Which of the following are the control items of HTTP behavior?) (multiple choice)
For special message attacks, which of the following option descriptions is correct?
A Special control packet attack is a potential attack and does not have direct destructive behavior
B. The attacker probes the network structure by sending special control messages to launch a real attack.
C. Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.
D. Special control message items can only use ICMP to construct attack messages.
Which of the following is the correct configuration idea for the anti-virus strategy?
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)
In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.
And development. Which of the following key points should be done in "things"? (multiple choice)
The virus signature database on the device needs to be continuously upgraded from the security center platform. Which of the following is the website of the security center platform?
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.
Generally, APT attacks can be summarized into four stages:
1. Collecting Information & Intrusion
2. Long-term lurking & mining
3. Data breach
4. Remote control and penetration
Regarding the order of these four stages, which of the following options is correct?
Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)
The status code in the HTTP response message indicates the type of the response message, and there are many possible values. Which of the following status codes represents the client request
The resource does not exist?
For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?
In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?
Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
Which of the following options is not a cyber security threat caused by weak personal security awareness?
Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)
USG6000V software logic architecture is divided into three planes: management plane, control plane and
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Regarding the sequence of file filtering technology processing flow, which of the following is correct?
(1) The security policy is applied as permit
(2) Protocol decoding
(3) File type recognition
(4) Application recognition
(5) File filtering
In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,
Consume equipment resources?
If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses
It is the stream scanning method.
Which aspects of information security will be caused by unauthorized access? (multiple choice)
In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc.
do. Which of the following options does not belong to the action that needs to be completed in the data processing part?
155955cc-666171a2-20fac832-0c042c0422
Which of the following options describes the IntelliSense engine IAE incorrectly?
If the regular expression is "abc. de", which of the following will not match the regular expression?
When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.
Note to the original link, which of the following options does not belong to the method of re-injection?
The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.
Signs: The workflow for the WAF tamper-proof module has the following steps:.
? WAF uses the pages in the cache to return to the client;
?WAF compares the watermark of the server page content with the page content in the cache
?Store the content of the page in the cache after learning
? When the user accesses the Web page, the WAF obtains the page content of the server
?WAF starts the learning mode to learn the page content of the user's visit to the website;
For the ordering of these steps, which of the following options is correct?
Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
The realization of content security filtering technology requires the support of the content security combination license.
Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)
When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist-item: At the same time, set it in the custom URL category.
A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More
select)
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O
Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?
Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device
Collect it in the log for continuous learning and optimization.
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
Which of the following options belong to the keyword matching mode? (multiple choice)
IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?
The following commands are configured on the Huawei firewall:
[USG] firewall defend ip-fragment enable
Which of the following situations will be recorded as an offensive behavior? (multiple choice)
Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)
Which of the following statement is correct about Policy Center system client function?