Which of the following is not a stand-alone anti-virus technology?
Which of the following is not a stand-alone anti-virus technology?A . Configure anti-virus technology on the network firewallB . Use virus detection toolsC . Patch the systemView AnswerAnswer: A
Which of the following descriptions of the VGMP protocol is incorrect?
Which of the following descriptions of the VGMP protocol is incorrect?A . VGMP adds multiple VRRP backup groups on the same firewall to a management group, and the management group manages all VRRP backup groups uniformly.B . VGMP ensures that the status of all VRRP backup groups in the management...
Which of the following attacks is not a malformed packet attack?
Which of the following attacks is not a malformed packet attack?A . Teardrop attackB . Smurf attackC . TCP fragmentation attackD . ICMP unreachable message attackView AnswerAnswer: D
Regarding the description of an intrusion detection system, which of the following is incorrect?
Regarding the description of an intrusion detection system, which of the following is incorrect?A . The intrusion detection system can dynamically collect a large amount of key information through the network and computer, and can analyze and judge the current status of the entire system environment in a timely manner.B...
Which stage of network security emergency response does the above action belong to?
When a network security incident occurs, investigate intrusions, viruses or Trojans, and patch and strengthen the host. Which stage of network security emergency response does the above action belong to?A . Recovery phaseB . Detection phaseC . Eradication phaseD . Inhibition stageView AnswerAnswer: D
When configuring a GRE Tunnel interface, the Destination address generally refers to which of the following parameters?
When configuring a GRE Tunnel interface, the Destination address generally refers to which of the following parameters?A . Local tunnel interface IP addressB . Local external network export IP addressC . Peer's external network egress IP addressD . Peer tunnel interface IP addressView AnswerAnswer: C
After enabling the GRE keepalive function, by default, the device will periodically send keepalive messages to the peer every how many seconds?
After enabling the GRE keepalive function, by default, the device will periodically send keepalive messages to the peer every how many seconds?A . 20B . 10C . 5D . 3View AnswerAnswer: C
Electronic evidence preservation is directly related to the legal validity of evidence. Only preservation that complies with legal procedures can ensure its authenticity and reliability. Which of the following is not an evidence preservation technology?
Electronic evidence preservation is directly related to the legal validity of evidence. Only preservation that complies with legal procedures can ensure its authenticity and reliability. Which of the following is not an evidence preservation technology?A . Encryption technologyB . Digital certificate technologyC . Digital signature technologyD . Message mark tracking...
In Huawei SDSec solution, which layer of equipment does the firewall belong to?
In Huawei SDSec solution, which layer of equipment does the firewall belong to?A . Analysis layerB . Control layerC . Execution layerD . Monitoring layerView AnswerAnswer: C
Intrusion prevention equipment can effectively defend against which of the following attacks?
Intrusion prevention equipment can effectively defend against which of the following attacks?A . Transport layerB . Application layerC . Network layerD . Physical layerView AnswerAnswer: B