If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)
The following commands are configured on the Huawei firewall:
[USG] firewall defend ip-fragment enable
Which of the following situations will be recorded as an offensive behavior? (multiple choice)
Configure the following commands on the Huawei firewall:
[USG] interface G0/0/1
[USG] ip urpf loose allow-defult-route acl 3000
Which of the following options are correct? (multiple choice)
IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?
Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?
1. The Netflow analysis device samples the current network flow;
2. Send a drainage command to the cleaning center;
3. Discover the DDoS attack stream;
4.Netior: analysis equipment sends alarms to ATIC management center
5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;
6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage
7. The cleaning log is sent to the management center to generate a report;
8. The cleaned traffic is sent to the original destination server.
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O
Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)
When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.
Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?
Which of the following is the correct configuration idea for the anti-virus strategy?
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
Regarding Huawei's anti-virus technology, which of the following statements is wrong?
Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?
Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)
After the user deploys the firewall anti-virus strategy, there is no need to deploy anti-virus software
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)
Which of the following technologies can achieve content security? (multiple choice)
For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?
For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?
When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist-item: At the same time, set it in the custom URL category.
A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More
select)