Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)
If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses
It is the stream scanning method.
Which of the following iterations is correct for the description of the management center?
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.
Signs: The workflow for the WAF tamper-proof module has the following steps:.
① WAF uses the pages in the cache to return to the client;
②WAF compares the watermark of the server page content with the page content in the cache
③Store the content of the page in the cache after learning
④ When the user accesses the Web page, the WAF obtains the page content of the server
⑤WAF starts the learning mode to learn the page content of the user's visit to the website;
For the ordering of these steps, which of the following options is correct?
Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?
Which of the following types of attacks are DDoS attacks? 2I
Which of the following options is not a feature of Trojan horses?
In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,
Consume equipment resources?
When a virus is detected in an email, which of the following is not the corresponding action for detection?
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
Regarding firewall and IDS, which of the following statements is correct?
The anti-virus feature configured on the Huawei USG6000 product does not take effect. Which of the following are the possible reasons? (multiple choice)
There are several steps in a stored XSS attack
①The attacker hijacks the user session
②The attacker submits an issue containing known JavaScript
③User login
④The user requests the attacker's question 5
⑤The server responds to the attacker’s JavaScript
⑥ The user's browser sends a session token to the attacker
⑦The attacker's JavaScript is executed in the user's browser
For the ordering of these steps, which of the following options is correct?
When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
Which of the following statement is correct about Policy Center system client function?
Which of the following is the default port number of Portal authentication service?
If the regular expression is "abc. de", which of the following will not match the regular expression?
Regarding the processing process of file overwhelming, which of the following statements is correct?
Cloud sandbox refers to deploying the sandbox in the cloud and providing remote detection services for tenants. The process includes:
1. Report suspicious files
2. Retrospective attack
3. Firewall linkage defense
4. Prosecution in the cloud sandbox
For the ordering of the process, which of the following options is correct?
Anti-DDoS defense system includes: management center, detection center and cleaning center.
The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall
A True
B. False
Which of the following options are common behavioral characteristics of viruses? (multiple choices)
Which of the following options is wrong for the description of the cleaning center?
When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist-item: At the same time, set it in the custom URL category.
A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More
select)
Server Fault information collection tool Server Collector, which of the following does collected information items not include?
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.
If you combine security defense with big data technology, which of the following statements are correct? (multiple choice)