SACG query right-manager information as follows, which options are correct? (Select 2 answers)
Which of the following descriptions about viruses and Trojans are correct? (multiple choices)
The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.
Which of the following options is correct for the description of the Anti DDoS system configuration?
When a virus is detected in an email, which of the following is not the corresponding action for detection?
Which of the following is not an abnormal situation of the file type recognition result?
Terminal fault diagnosis tool can diagnose fault, also can collect terminal information.
Among the following options, which attack is a malformed packet attack based on the TCR protocol?
Which of the following options is wrong for the description of the cleaning center?
The results of the RBL black and white list query on the firewall are as follows:
Based on the above information only, which of the following statements is correct? (multiple choice)
Which of the following behaviors is a false positive of the intrusion detection system?
If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More
155955cc-666171a2-20fac832-0c042c0420
select)
When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)
The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files. Which of the following is not allowed Can the reason?
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.
To hide itself and the role of designated files.
Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
Regarding scanning and snooping attacks, which of the following descriptions is wrong?
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main
Which four major components are included?
When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
Which of the following options describes the IntelliSense engine IAE incorrectly?
What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)
Place refers to the terminal environment when end-user use strategy management center access to
controlled network office, which options are correct about place? (Choose 2 answers)