3 Months Free Update
3 Months Free Update
3 Months Free Update
Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If you need to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
An account can belong to multiple roles, that is, a user may hold multiple positions.
If you deploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?
What equipment do Policy Center supported servers include? (Choose 3 answers)
Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
Regarding the description of the security zone in the Agile Controller-Campus, which of the following options are correct? (multiple choice)
The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?
Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.
The realization of content security filtering technology requires the support of the content security combination license.
Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?
In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.
Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?
1. The Netflow analysis device samples the current network flow;
2. Send a drainage command to the cleaning center;
3. Discover the DDoS attack stream;
4.Netior: analysis equipment sends alarms to ATIC management center
5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;
6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage
7. The cleaning log is sent to the management center to generate a report;
8. The cleaned traffic is sent to the original destination server.
About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)
The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.
Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?
Regarding the description of the ACL used in the linkage between SACG equipment and the TSM system, which of the following statements is correct!?
Which of the following options are correct for the description of visitor management? (Multiple choice)
Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.
Which of the following behaviors is a false positive of the intrusion detection system?
Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following
What is the content of the intrusion detection knowledge base?
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.
Generally, APT attacks can be summarized into four stages:
1. Collecting Information & Intrusion
2. Long-term lurking & mining
3. Data breach
4. Remote control and penetration
Regarding the order of these four stages, which of the following options is correct?
Hardware in useSACG At the time of certification,SACG After the configuration is completed, you can seeSACG andAgile Agile Controller-Campus The linkage is successful, but the user authentication fails. This phenomenon may be caused by the following reasons? (Multiple choice)
The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.
When the account is distributed to users, what stage does the distribution of the account belong to?
When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.
According to the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.
There are three types. Which of the following formats is not included?
For the description of the Anti DDOS system, which of the following options is correct? C
When performing terminal access control, the authentication technology that can be used does not include which of the following options?
If the regular expression is "abc. de", which of the following will not match the regular expression?
If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)
The following is a hardware SACG increase firewall configuration, which statement below is true?
Visitor management can authorize visitors based on their account number, time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.
Agile Controller-Campus The system architecture belongs to C/S Architecture.
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.
Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?
Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.
Wen attack.
The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined
The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are
Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?
Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)
Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?
In enterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding the description of binding the terminal host and account, which of the following is correct?
Which of the following options is for Portal The description of the role of each role in the authentication system is correct?