Which of the following is not the responsibility of the Anti-DDos defense system management center?

Which of the following is not the responsibility of the Anti-DDos defense system management center?A . Security report analysisB . Device ManagementC . Issue defense strategiesD . Carry out traffic diversionView AnswerAnswer: D

April 11, 2024No CommentsREAD MORE +

Which of the following descriptions about Huawei IPS equipment upgrade is correct?

Which of the following descriptions about Huawei IPS equipment upgrade is correct?A . Upgrading the signature database of Huawei IPS does not require license authorization.B . Upgrading the system version of Huawei IPS will take effect without restarting the device.C . Upgrading the signature database of Huawei IPS requires restarting...

April 11, 2024No CommentsREAD MORE +

Which of the following is the correct ranking of the Stuxnet virus attack process?

The "Stuxnet" virus is a worm that attacks industrial control systems. Which of the following is the correct ranking of the Stuxnet virus attack process?A . Reconnaissance of organizational structure and personnel information->Social engineering penetration->Looking for infection targets->Using USB flash drives for lateral spread->Launching attacksB . Find infection targets ->...

April 11, 2024No CommentsREAD MORE +

Which of the following is not an implementation process of bandwidth management?

Which of the following is not an implementation process of bandwidth management?A . Bandwidth channelB . Traffic AnalysisC . Interface speed limitD . Bandwidth policyView AnswerAnswer: B

April 11, 2024No CommentsREAD MORE +

As shown in the figure, IPSec tunnels are established between the headquarters and branches. To achieve IPSec traffic load sharing, at least how many IPSec tunnels need to be established?

As shown in the figure, IPSec tunnels are established between the headquarters and branches. To achieve IPSec traffic load sharing, at least how many IPSec tunnels need to be established? A . 1B . 2C . 4D . 3View AnswerAnswer: C

April 11, 2024No CommentsREAD MORE +

When IPSec uses certificate authentication, it is necessary to verify the legitimacy of the peer certificate. Which of the following is not a factor that needs to be considered to verify the legitimacy of the certificate?

When IPSec uses certificate authentication, it is necessary to verify the legitimacy of the peer certificate. Which of the following is not a factor that needs to be considered to verify the legitimacy of the certificate?A . Whether the certificate is applied for in the same wayB . Whether the...

April 11, 2024No CommentsREAD MORE +

IPS devices work based on specific intrusion prevention mechanisms. Which of the following is the correct ranking of intrusion prevention mechanisms?

IPS devices work based on specific intrusion prevention mechanisms. Which of the following is the correct ranking of intrusion prevention mechanisms?A . Feature matching->Reorganize application data->Protocol identification and protocol parsing->Response processingB . Reorganize application data->Protocol identification and protocol parsing->Feature matching->Response processingC . Reorganize application data->Feature matching->Protocol identification and protocol parsing->Response...

April 11, 2024No CommentsREAD MORE +

To check whether there is an abnormal task plan (not set by the user) on the Linux host, which of the following commands can be used?

To check whether there is an abnormal task plan (not set by the user) on the Linux host, which of the following commands can be used?A . crontab -u mysqlB . crontab -eC . crontab -rD . crontab -lView AnswerAnswer: D

April 11, 2024No CommentsREAD MORE +

Which of the following descriptions about the characteristics of Eth-Trunk is incorrect?

Which of the following descriptions about the characteristics of Eth-Trunk is incorrect?A . Eth-Trunk can be a Layer 2 interface or a Layer 3 interface.B . Eth-Trunk is a logical interfaceC . There are at least 2 Eth-Trunk member linksD . There is at least 1 active Eth-Trunk linkView AnswerAnswer:...

April 11, 2024No CommentsREAD MORE +

Which of the following descriptions about virtual system offloading is incorrect?

Which of the following descriptions about virtual system offloading is incorrect?A . When the interface works at Layer 2, VLAN-based traffic distribution is used.B . When the interface works at Layer 3, the interface-based offloading method is adopted.C . Through offloading, packets entering the device can be sent to the...

April 11, 2024No CommentsREAD MORE +