Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

A.

Block

B.

Declare

C.

Alarm

D.

Execution

The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.

A.

True

B.

False

After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?

A.

Assign to user

B.

Assigned to account

C.

Assign to terminal IP Address range

D.

Assigned to places

The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files. Which of the following is not allowed Can the reason?

A.

The file filtering configuration file is not referenced in the security policy

B.

File filtering configuration file is incorrect

C.

License is not activated.

D.

The action configuration of the file extension does not match is incorrect

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

A.

DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,

155955cc-666171a2-20fac832-0c042c047

B.

DF bit is 023, MF bit is 1 or Fragment Offset is not 0,

C.

DF bit is 0, and Fragment Offset + Length> 65535.

D.

The DF bit is 1, and Fragment Ofset + Length <65535.

With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.

Generally, APT attacks can be summarized into four stages:

1. Collecting Information & Intrusion

2. Long-term lurking & mining

3. Data breach

4. Remote control and penetration

Regarding the order of these four stages, which of the following options is correct?

A.

2-3-4-1

B.

1-2-4-3

C.

1-4-2-3

D.

2-1-4-3

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

A.

True

B.

False

Regarding the identity authentication method and authentication type, which of the following descriptions is correct?

A.

User passed web The method can support two authentication types: local authentication and digital certificate authentication.

B.

User passed web Agent The method can support two authentication types: digital certificate authentication and system authentication.

C.

User passed Agent The method can support three authentication types: local authentication, digital certificate authentication and system authentication.

D.

User passed web Agent The method can support two authentication types: digital certificate authentication and local authentication.

Which is correct about the following Policy Center troubleshooting process?

A.

Hardware fault-> connection fault-> NAC client fault-> Policy Center server fault

B.

connection fault-> Hardware fault-> NAC client fault-> Policy Center server fault

C.

Hardware fault-> connection fault-> Policy Center server fault-> NAC client fault

D.

hardware fault-> NAC client fault-> connection fault-> Policy Center server fault

In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc.

do. Which of the following options does not belong to the action that needs to be completed in the data processing part?

155955cc-666171a2-20fac832-0c042c0422

A.

Data preprocessing

B.

Threat determination

C.

Distributed storage

D.

Distributed index