Regarding the principle of MAC authentication, which of the following descriptions is wrong?
An account can belong to multiple roles, that is, a user may hold multiple positions.
The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.
Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?
Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.
These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.
Which of the following options is not a cyber security threat caused by weak personal security awareness?
Which of the following law items is the most blessed for safety? This should be true?
In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.
When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?
Regarding the file source set in the software management, which of the following descriptions is correct?
After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.
Regarding the description of the logic architecture of the business accompanying, which of the following options is correct?
Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)
Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main
Which four major components are included?
Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
Regarding traditional firewalls, which of the following statements are correct? (multiple choice)
When a guest needs to access the network through an account, which of the following methods can be used to access? (Multiple choice)
Regarding patch management and Windows patch checking strategies, which of the following descriptions is wrong?
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.
For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?
The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
Which of the following is the default port number of Portal authentication service?
The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?
The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.
When the account is distributed to users, what stage does the distribution of the account belong to?
Which of the following statement is correct about Policy Center system client function?
The service free mobility function of the Agile Controller can guide the flow to the security center for processing according to the service, improving the utilization of physical equipment.
If you deploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?
The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?
Which of the following methods can be used to protect enterprise terminal security?
The user needs of a university are as follows:
1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
3. At the same time, some pornographic websites in the student area are prohibited.
The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?
155955cc-666171a2-20fac832-0c042c0415
In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?
The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).
Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?
There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.
Regarding the description of the account blacklist, which of the following options is wrong?
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
Regarding the strategy for checking the screensaver settings, which of the following descriptions are correct? (Multiple choice)
In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)
When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?
In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?
The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?
Terminal security access technology does not include which of the following options?