Which of the following options will not pose a security threat to the network?
The results of the RBL black and white list query on the firewall are as follows:
Based on the above information only, which of the following statements is correct? (multiple choice)
Regarding the sequence of file filtering technology processing flow, which of the following is correct?
(1) The security policy is applied as permit
(2) Protocol decoding
(3) File type recognition
(4) Application recognition
(5) File filtering
Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?
Regarding the anti-spam local black and white list, which of the following statements is wrong?
Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition
Contains content, the device can block or alert traffic containing specific keywords.
The user needs of a university are as follows:
1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
3. At the same time, some pornographic websites in the student area are prohibited.
The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?
155955cc-666171a2-20fac832-0c042c0415
The administrator has made the following configuration:
1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
2. The action of overwriting signature ID3000 is an alarm.
The following commands are configured on the Huawei firewall:
[USG] firewall defend ip-fragment enable
Which of the following situations will be recorded as an offensive behavior? (multiple choice)
Which of the following technologies can achieve content security? (multiple choice)
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.
Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)
There are several steps in a stored XSS attack
â‘ The attacker hijacks the user session
â‘¡The attacker submits an issue containing known JavaScript
â‘¢User login
â‘£The user requests the attacker's question 5
⑤The server responds to the attacker’s JavaScript
â‘¥ The user's browser sends a session token to the attacker
⑦The attacker's JavaScript is executed in the user's browser
For the ordering of these steps, which of the following options is correct?
Regarding the description of keywords, which of the following is correct? (multiple choice)
For the description of URPF technology, which of the following options are correct? (multiple choice)
The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?
After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)
In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,
Consume equipment resources?