According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)
Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?
Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)
There are several steps in a stored XSS attack
①The attacker hijacks the user session
②The attacker submits an issue containing known JavaScript
③User login
④The user requests the attacker's question 5
⑤The server responds to the attacker’s JavaScript
⑥ The user's browser sends a session token to the attacker
⑦The attacker's JavaScript is executed in the user's browser
For the ordering of these steps, which of the following options is correct?
File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.
Which of the following signature attributes cannot be configured for IP custom signature?
Which of the following is the default port number of Portal authentication service?
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)
For the description of URPF technology, which of the following options are correct? (multiple choice)
If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More
155955cc-666171a2-20fac832-0c042c0420
select)
Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.
Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main
Which four major components are included?
Regarding the processing flow of file filtering, which of the following statements is wrong?
When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?
Which of the following options belongs to MC prioritized pail Authentication application scenarios?
Which of the following law items is the most blessed for safety? This should be true?
The results of the RBL black and white list query on the firewall are as follows:
Based on the above information only, which of the following statements is correct? (multiple choice)
URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.
The purpose of the Internet behavior.
Regarding the strategy for checking the screensaver settings, which of the following descriptions are correct? (Multiple choice)
Regarding the sequence of file filtering technology processing flow, which of the following is correct?
(1) The security policy is applied as permit
(2) Protocol decoding
(3) File type recognition
(4) Application recognition
(5) File filtering
The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?
Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.
Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.
How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)
According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)
The service free mobility function of the Agile Controller can guide the flow to the security center for processing according to the service, improving the utilization of physical equipment.
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
An enterprise adopts hardware SACG access method for admission control. The configuration commands are as follows, among which Key; Admin@123
[USG] right-manager server-group
[USG-rightm] localip 10.1.10.2
[USG-rightm]serverip 10. 1.31.78 shared-key AdnIn@123
[USG2100-rightm] right-manager server-group enable.
Assuming that the other configurations are correct, based on the above configuration only, which of the following options is correct?
In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc.
do. Which of the following options does not belong to the action that needs to be completed in the data processing part?
155955cc-666171a2-20fac832-0c042c0422
Which of the following attacks are attacks against web servers? (multiple choices)
Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.
In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.
The use of the 802.1X authentication scheme generally requires the terminal to install specific client software. For large-scale deployment of client software, the methods that can be taken. What are the cases? (multiple choices)
The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall
A True
B. False
Regarding the description of keywords, which of the following is correct? (multiple choice)
Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules
To detect intrusions in the system. Which of the following is not a feature of misuse detection 2
Regarding the basic principles of user access security, it is wrong not to list any description?
Agile Controller-Campus All components are supported Windows System and Linux system.
Which of the following cybersecurity threats exist only in WLAN In the network?
For the scenario where the authentication server adopts distributed deployment, which of the following descriptions are correct? (multiple choice)
Which of the following options are common behavioral characteristics of viruses? (multiple choices)
Which of the following options is not included in the mobile terminal life cycle?
For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.
The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile Controller-Campus. Synchronize.
The Agile Controller-Campus can only be authorized by user group. If it is not synchronized to the Agile Controller-Campus, it can be fine-tuned based on the account.
Authorization
The traditional campus network is based on IP As the core network, if there are mobile office users, which of the following options is not the problem that mobile office users face when deploying access authentication?
Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)