Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?
What content can be filtered by the content filtering technology of Huawei USG6000 products?
If the regular expression is "abc. de", which of the following will not match the regular expression?
Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)
When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
Which of the following statement on the scanner is wrong?
Agile Controller-Campus As RADIUS When the server performs authentication, how many ends need to be configured for authentication on the admission control device?
What are the typical technologies of anti-virus engines (multiple choice)
In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)
Regarding the way SACG devices connect to the network, which of the following descriptions are correct? (multiple choice)
Use hardware SACG Access control,,In hardware SACG View the results of the conversation table on the deduction.
Which of the following statements are correct? (Multiple choice)
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.
Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?
1. The Netflow analysis device samples the current network flow;
2. Send a drainage command to the cleaning center;
3. Discover the DDoS attack stream;
4.Netior: analysis equipment sends alarms to ATIC management center
5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;
6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage
7. The cleaning log is sent to the management center to generate a report;
8. The cleaned traffic is sent to the original destination server.
Regarding the file source set in the software management, which of the following descriptions is correct?
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Regarding computer viruses, which of the following options is correct?
The results of the RBL black and white list query on the firewall are as follows:
Based on the above information only, which of the following statements is correct? (multiple choice)
Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)
Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.
Which of the following options belong to the network reliability? (multiple choice)
If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More
155955cc-666171a2-20fac832-0c042c0420
select)
If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)
Which of the following options is not a defense against HTTP Flood attacks?
Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following
What is the content of the intrusion detection knowledge base?
After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)
About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?
In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.
Identity authentication determines whether to allow access by identifying the identity of the access device or user.
In the Agile Controller-Campus solution, which device is usually used as the hardware SACG?
Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)
The following is the 802.1X access control switch configuration:
[S5720]dot1x authentication-method eap
[S5720-GigabitEthernet0/0/1] port link-type access
[S5720-GigabitEthemet0/0/1] port default vlan 11
[S5720-GigabitEthernet0/0/1] authentication dot1x
Assuming that GE0/0/1 is connected to user 1 and user 2 through the HUB, which of the following options is correct?
Which of the following descriptions about the black and white lists in spam filtering is wrong? c
The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall
A True
B. False
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)
Visitors can access the network through their registered account. Which of the following is not an account approval method?
In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)
When a guest needs to access the network through an account, which of the following methods can be used to access? (Multiple choice)
On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)
Which of the following options is not a cyber security threat caused by weak personal security awareness?
There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.
Which of the following is not a local account?
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files. Which of the following is not allowed Can the reason?
When performing terminal access control, the authentication technology that can be used does not include which of the following options?
Regarding the description of the ACL used in the linkage between SACG equipment and the TSM system, which of the following statements is correct!?
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
Which of the following options cannot be triggered MAC Certification?
URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.
The purpose of the Internet behavior.
View on the switch Agile Controller-Campus The policy issued by the server is as follows:
For this strategy, which of the following options are correct? (Multiple choice)
Regarding the description of intrusion detection technology, which of the following statements is correct?
The following is a hardware SACG increase firewall configuration, which statement below is true?
An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?
In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?
Which of the following options is not a challenge brought by mobile office?
In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)
There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.