When NIP is deployed at the Internet perimeter, it is generally deployed in the egress firewall or router back, transparent access network. Which of the following features is the main focus of the summer scene
The target IP address information can be collected through attacks, such as distributed denial-of-service attacks to obtain the target's IP information. (single selection).
The antivirus system identifies the target of attack based on the characteristics of the detected object The APT defense system identifies the attack object based on the behavior of the detected object.
The signature filter will batch out signatures, and usually set to a uniform action for ease of management. If an app wants to treat it differently You can also use exception signatures to match O's from signature filters
When Hisec Insight is linked with terminals, it is mainly linked with the EDR of third-party vendors with cooperative relationships.
Nmap can only be used to scan a single host, but it cannot be used to scan a large computer network to find out which hosts and services of interest are found
Which of the following options allows complete destruction of data, (multiple selection)
The server can set or read the information contained in the cookie This maintains state in the user's session with the server.
A5RUE
B. FALSE
The following is a description of DNS transparent proxy Which ones are correct? (multiple selection).
Domain name information collection is the first step in technical means information collection Domain name information can be collected through a domain name lookup website such as hois (single selection).
When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ensure the security of user data operations.
Which of the following is not a cybersecurity threat (single selection).
In general, which level of level of protection requirements does the non-secret-related information system in the county-level unit need to meet?
Which of the following situational aware detection attacks can DDOS attacks, firewall bypasses, and malware outreach attacks know? (multiple selection).
The following describes port scanning Which is wrong? (single selection).
Which of the following parameters is included in the DNS request routing method in the firewall DNS transparent proxy?
A global traffic steering strategy
B. Normal static or dynamic routing routing is selected
C. Policy routing routing is routed
D. The intelligent traffic steering mode configured by the DNS transparent proxy itself
Figure 1 shows the raw data table Figure 2 shows the data processed by K•anonymization technology, what is the K value of the processing? (Selection).
As shown in the following figure, you use the bypass method to deploy the Anti-DDoS system 8GP drainage UN route is used. The port numbers of the P1-P5 devices in the figure, what happens if a routing policy is not configured on R1 to direct cleansed traffic to P5? (single selection).
in the architecture of software-defined security Which of the following feature descriptions is correct?
USG firewall's DDoS attack prevention techniques include which of the following?
Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)
Zombie networks are used to spread viruses and cannot launch DDos attacks
The intensity of a system security threat is only related to the vulnerability of the system, and a well-protected system is basically immune to attack.
Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.
To implement private network user A to access the Internet network after user B That is, which of the following source NAT modes can be configured on the exit firewall to be actively accessed by other users in the Internet network?
The following describes FW's application behavior control features Which one is correct? (single selection).
The following describes vulnerabilities and identification and assessment Which one is incorrect? (single selection).
The following describes the service identification Which item ◊ (single selection) is wrong
In the Anti-DDos system, the function of cleaning devices is to detect anomalous traffic in the network and escalate to the management centre (single selection).
About Huawei's firewall defense technology against SYN Flood Which of the following options is correctly described?
If you can successfully access www.huawei.com network resources, which of the following protocols is not involved? (single selection).
A description of the following IPv6 Secure Neighbor Discovery feature information for one of the interfaces Which one is wrong?
With the following description of the difference between stored XSS and reflected XSS, what are the correct items? (multiple selection).
SA-SDB and SAEngine are used to identify the traffic in the network, and the device analyzes the network traffic according to the identification results, and can generate traffic reports or carry out corresponding control strategies for traffic, such as release, throttling and redirection.
Which of the following are important to the corporate network?
Which options below are the main changes in Equal Protection 2.0 compared to Equal Protection 1.0' (multiple choices).
By default, the firewall authenticates traffic that passes through itself.
As shown in the following figure The headquarters network is deployed with dual machines, and the L2TPoverlPSec is configured separately to access the headquarters network. Below is a description of the configuration of interest in IPSec Which one is correct? (single selection).
As ad number 3000
rule 10 permit udp souce-port eq 1701
B. acl number 3000
rule 10 permit tcp souce-port eq 1701
C. ad number 3000
rule 10 permit tcp destingation-poa eq 1701
D. acl number 3000
rule 10 permit udp destingation-port eq 1701
The SQL injection vulnerability occurs due to the lack of validation of the legitimacy of user input
When using server authentication Before visiting the business, the visitor first logs in through the client or potal authentication page The firewall then proactively obtains the user's login information (including the username and IP address used by the visitor) from the server (single selection).
In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).