In addition to the conventional configuration, what special configuration is needed?
802.1X During the authentication, if the authentication point is at the aggregation switch, in addition to RADIUS,AAA,802.1X. In addition to the conventional configuration, what special configuration is needed?A . Both the aggregation layer and the access layer switches need to be turned on 802.1X Function. B. Access layer switch needs...
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)A . Local upgrade B. Manual upgrade C. Online upgrade D. Automatic upgradeView AnswerAnswer: A,C
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.A . True B. FalseView AnswerAnswer: A
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver. To hide itself and the role of designated files.A . True B. FalseView AnswerAnswer: A
For the account creation method, which of the following descriptions is wrong?
When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?A . When adding accounts individually, you can choose to create them individually. B. If there are a lot of users,...
Which of the following files can the sandbox detect? (multiple choice)
Which of the following files can the sandbox detect? (multiple choice)A . www file B. PE file C. Picture file D. MailView AnswerAnswer: A,B,C
Jailbroken mobile terminalMobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?
Jailbroken mobile terminalMobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?A . Directly discard data sent by devices that do not comply...
Which of the following is the default port number of Portal authentication service?
Which of the following is the default port number of Portal authentication service?A . 1812 B. 1813 C. 50200 D. 50300View AnswerAnswer: A,C
Which of the following is correct regarding the order of priority?
Sort all services according to user group and account: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the...
In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.
In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use. The traffic does not need to go through the firewall y. For the firewall, it belongs to the...