Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black
Whitelist and other configuration files.
A True
B. False
Which of the following options is not a defense against HTTP Flood attacks?
Huawei's USG000 product can identify the true type of common files and over-check the content. Even if the file is hidden in a compressed file, or change the extension
The name of the exhibition can't escape the fiery eyes of the firewall.
Place refers to the terminal environment when end-user use strategy management center access to
controlled network office, which options are correct about place? (Choose 2 answers)
For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
Regarding the description of intrusion detection technology, which of the following statements is correct?
Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment
Anti-Virus, IPS, spam detection and other equipment.
Which of the following is the correct configuration idea for the anti-virus strategy?
1. Load the feature library
2. Configure security policy and reference AV Profile
3. Apply and activate the license
4. Configure AV Profile
5. Submit
The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.
SQl injection attacks generally have the following steps:
①Elevate the right
②Get the data in the database
③Determine whether there are loopholes in the webpage
④ Determine the database type
For the ordering of these steps, which of the following options is correct?
With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.
Generally, APT attacks can be summarized into four stages:
1. Collecting Information & Intrusion
2. Long-term lurking & mining
3. Data breach
4. Remote control and penetration
Regarding the order of these four stages, which of the following options is correct?
SACG query right-manager information as follows, which options are correct? (Select 2 answers)
The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O
Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
Configure the following commands on the Huawei firewall:
[USG] interface G0/0/1
[USG] ip urpf loose allow-defult-route acl 3000
Which of the following options are correct? (multiple choice)
What content can be filtered by the content filtering technology of Huawei USG6000 products?
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)
The following is a hardware SACG increase firewall configuration, which statement below is true?
Which of the following options are common reasons for IPS detection failure? (multiple choices)
Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.