IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)
The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined
The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are
Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?
In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.
For the description of the Anti DDOS system, which of the following options is correct? C
Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system
If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)
Which of the following is the correct configuration idea for the anti-virus strategy?
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
Which of the following options belong to the keyword matching mode? (multiple choice)
After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)
For the description of URPF technology, which of the following options are correct? (multiple choice)
Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve
For confidentiality, integrity and availability. ,
Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main
Which four major components are included?
When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.
When a virus is detected in an email, which of the following is not the corresponding action for detection?
The anti-virus feature configured on the Huawei USG6000 product does not take effect. Which of the following are the possible reasons? (multiple choice)
Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.
Which of the following options belong to the network reliability? (multiple choice)
Which of the following options are common behavioral characteristics of viruses? (multiple choices)
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
There are several steps in a stored XSS attack
①The attacker hijacks the user session
②The attacker submits an issue containing known JavaScript
③User login
④The user requests the attacker's question 5
⑤The server responds to the attacker’s JavaScript
⑥ The user's browser sends a session token to the attacker
⑦The attacker's JavaScript is executed in the user's browser
For the ordering of these steps, which of the following options is correct?
Which of the following is not an abnormal situation of the file type recognition result?
Among the following options, which attack is a malformed packet attack based on the TCR protocol?
When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)
In order to protect the security of data transmission, more and more websites or companies choose to use SSL to encrypt transmissions in the stream. About using Huawei NIP6000
The product performs threat detection on (SSL stream boy, which of the following statements is correct?
Regarding the anti-spam local black and white list, which of the following statements is wrong?