Which of the following options are common behavioral characteristics of viruses? (multiple choices)
If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?
Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?
Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black
Whitelist and other configuration files.
A True
B. False
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist-item: At the same time, set it in the custom URL category.
A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More
select)
Which of the following options is correct for the description of the Anti DDoS system configuration?
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
For the description of the Anti DDOS system, which of the following options is correct? C
SACG query right-manager information as follows, which options are correct? (Select 2 answers)
Terminal fault diagnosis tool can diagnose fault, also can collect terminal information.
For compressed files, the virus detection system can directly detect them.
Which of the following iterations is correct for the description of the management center?
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.
Huawei NIP6000 products have zero-setting network parameters and plug-and-play functions, because the interfaces and interface pairs only work on layer 2 without
Set the IP address.
A True
B. False
Regarding the sequence of the mail transmission process, which of the following is correct?
1. The sender PC sends the mail to the designated SMTP Server.
2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail
3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver
4. The recipient sends an email.
What equipment do Policy Center supported servers include? (Choose 3 answers)
Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment
Anti-Virus, IPS, spam detection and other equipment.
In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.
Regarding traditional firewalls, which of the following statements are correct? (multiple choice)