If the regular expression is "abc. de", which of the following will not match the regular expression?
Regarding traditional firewalls, which of the following statements are correct? (multiple choice)
Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?
An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?
Regarding the basic principles of user access security, it is wrong not to list any description?
Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.
Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment
Anti-Virus, IPS, spam detection and other equipment.
The following is a hardware SACG increase firewall configuration, which statement below is true?
Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?
Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?
For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.
Which of the following is the correct configuration idea for the anti-virus strategy?
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
For the terminal Wi-Fi The order of the push, which of the following is correct?
1. Any Office Mobile office system push Wi-Fi Configuration
2. Any Office The mobile office department automatically applies for a certificate.
3. The administrator configures the enterprise Wi-Fi Push.
4. The terminal automatically connects to the enterprise Wi-Fi.
Regarding intrusion prevention, which of the following option descriptions is wrong
If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More
155955cc-666171a2-20fac832-0c042c0420
select)
The anti-virus feature configured on the Huawei USG6000 product does not take effect. Which of the following are the possible reasons? (multiple choice)
The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.
Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?
Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.
Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.
Which of the analysis, feedback and refinement is the function included in the first two stages?
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
Regarding WLAN, which of the following descriptions is correct?
According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)
Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)
An account can only belong to one user group, that is, a user can only belong to one department.
Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.
In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
Free mobility is a special access control method, according to the user’s access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user’s access conditions remain unchanged, the permissions and network experience after accessing the network--To q
Among the following options, which attack is a malformed packet attack based on the TCR protocol?
Install Agile Controller-Campus Which of the following steps do not need to be completed before?
Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)
There are several steps in a stored XSS attack
①The attacker hijacks the user session
②The attacker submits an issue containing known JavaScript
③User login
④The user requests the attacker's question 5
⑤The server responds to the attacker’s JavaScript
⑥ The user's browser sends a session token to the attacker
⑦The attacker's JavaScript is executed in the user's browser
For the ordering of these steps, which of the following options is correct?
Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.
These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Which of the following law items is the most blessed for safety? This should be true?
Which of the following descriptions about the black and white lists in spam filtering is wrong? c
What are the three main steps of business free deployment? (Multiple choice)
An account can belong to multiple roles, that is, a user may hold multiple positions.
Which of the following elements does PDCA include? (Choose 3 answers)
In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc.
do. Which of the following options does not belong to the action that needs to be completed in the data processing part?
155955cc-666171a2-20fac832-0c042c0422
After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)
For the basic mode of HTTP Flood source authentication, which of the following options are correct? (multiple choice)
According to the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.
There are three types. Which of the following formats is not included?
Regarding the description of intrusion detection technology, which of the following statements is correct?
Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)
Which of the following iterations is correct for the description of the management center?
In the process of establishing CAPWAP channel between AP and AC, AP and AC negotiate to establish CAPWAP tunnel. In this process, CAPWAP tunnel is established.
Use DTLS to encrypt and transmit UDP packets. What are the encryption methods supported by DTLS? (multiple choice)
Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)
VIP Experience guarantee, from which two aspects are the main guarantees VIP User experience? (Multiple choice)
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
Which of the following options is not a challenge brought by mobile office?
Agile Controller-Campus As RADIUS When the server performs authentication, how many ends need to be configured for authentication on the admission control device?
Which of the following options is not a feature of big data technology?
Server Fault information collection tool Server Collector, which of the following does collected information items not include?
The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?