Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.
For the description of URPF technology, which of the following options are correct? (multiple choice)
For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Regarding the anti-spam local black and white list, which of the following statements is wrong?
Which of the following attacks are attacks against web servers? (multiple choices)
What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)
Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.
Which of the following options belong to the network reliability? (multiple choice)
Regarding scanning and snooping attacks, which of the following descriptions is wrong?
Which of the following are the control items of HTTP behavior?) (multiple choice)
Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?
The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.
Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)
The configuration command to enable the attack prevention function is as follows; n
[FW] anti-ddos syn-flood source-detect
[FW] anti-ddos udp-flood dynamic-fingerprint-learn
[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn
[FW] anti-ddos http-flood defend alert-rate 2000
[Fwj anti-ddos htp-flood source-detect mode basic
Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)
The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files. Which of the following is not allowed Can the reason?
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)
File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.
Which of the following is not an abnormal situation of the file type recognition result?
The user needs of a university are as follows:
1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
3. At the same time, some pornographic websites in the student area are prohibited.
The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?
155955cc-666171a2-20fac832-0c042c0415
An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?
In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.
And development. Which of the following key points should be done in "things"? (multiple choice)