Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)
Which aspects of information security will be caused by unauthorized access? (multiple choice)
Which is correct about the following Policy Center troubleshooting process?
Place refers to the terminal environment when end-user use strategy management center access to
controlled network office, which options are correct about place? (Choose 2 answers)
Regarding intrusion prevention, which of the following option descriptions is wrong
The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.
The user needs of a university are as follows:
1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
3. At the same time, some pornographic websites in the student area are prohibited.
The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?
155955cc-666171a2-20fac832-0c042c0415
Which of the following technologies can achieve content security? (multiple choice)
Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.
Which of the analysis, feedback and refinement is the function included in the first two stages?
Which of the following options is not a special message attack?
Which of the following statement is correct about Policy Center system client function?
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
When a virus is detected in an email, which of the following is not the corresponding action for detection?
Which of the following behaviors is a false positive of the intrusion detection system?
In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.
To hide itself and the role of designated files.
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?
1. The Netflow analysis device samples the current network flow;
2. Send a drainage command to the cleaning center;
3. Discover the DDoS attack stream;
4.Netior: analysis equipment sends alarms to ATIC management center
5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;
6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage
7. The cleaning log is sent to the management center to generate a report;
8. The cleaned traffic is sent to the original destination server.
If the regular expression is "abc. de", which of the following will not match the regular expression?
For special message attacks, which of the following option descriptions is correct?
A Special control packet attack is a potential attack and does not have direct destructive behavior
B. The attacker probes the network structure by sending special control messages to launch a real attack.
C. Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.
D. Special control message items can only use ICMP to construct attack messages.
Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?
If you combine security defense with big data technology, which of the following statements are correct? (multiple choice)
Which of the following signature attributes cannot be configured for IP custom signature?
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.
For the description of the Anti DDOS system, which of the following options is correct? C
Which of the following options is not a cyber security threat caused by weak personal security awareness?
When configuring the terminal visits, we put some equipment configured exception equipment ,which of the following statements are true about the exception equipment?
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Regarding computer viruses, which of the following options is correct?