Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)
Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended. B. If most end users are concentrated...
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?A . File extension mismatch means that the file type is inconsistent with the file extension. B. Unrecognized file type means that the file type cannot be recognized and there is no...
Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)
Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)A . Address scanning B. Buffer overflow p C. Port scan D. IP spoofingView AnswerAnswer: A,D
Which way can NAC Agent upgrade package be deployed?
Which way can NAC Agent upgrade package be deployed?A . By IP addresses B. By terminal type C. By account D. By user informationView AnswerAnswer: A
Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.
Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.A . True B. FalseView AnswerAnswer: B
Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)
Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended. B. If most end users are concentrated...
For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?
For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?A . Cannot control the number of received email attachments B. When the spam processing action is an alert, the email will be blocked and an alert will be generated C. You can control the size...
Which of the following attacks are attacks against web servers? (multiple choices)
Which of the following attacks are attacks against web servers? (multiple choices)A . Website phishing deception B. Website Trojan C. SQL injection D. Cross-site scripting attacks 2335View AnswerAnswer: C,D
If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?
If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?A . Generate logs and discard B. Generate logs and forward them C. Delete the content of the email attachment D. Add announcement and generate logView AnswerAnswer: B
What is the working mode of AP?
Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are. What is the working mode of AP? (multiple choice)A . access mode B. Normal mode C. Mixed mode D. Monitoring...