Which of the following is not a stand-alone anti-virus technology?

Which of the following is not a stand-alone anti-virus technology?A . Configure anti-virus technology on the network firewallB . Use virus detection toolsC . Patch the systemView AnswerAnswer: A

November 25, 2023 No Comments READ MORE +

Which of the following descriptions of the VGMP protocol is incorrect?

Which of the following descriptions of the VGMP protocol is incorrect?A . VGMP adds multiple VRRP backup groups on the same firewall to a management group, and the management group manages all VRRP backup groups uniformly.B . VGMP ensures that the status of all VRRP backup groups in the management...

November 25, 2023 No Comments READ MORE +

Which of the following attacks is not a malformed packet attack?

Which of the following attacks is not a malformed packet attack?A . Teardrop attackB . Smurf attackC . TCP fragmentation attackD . ICMP unreachable message attackView AnswerAnswer: D

November 25, 2023 No Comments READ MORE +

Regarding the description of an intrusion detection system, which of the following is incorrect?

Regarding the description of an intrusion detection system, which of the following is incorrect?A . The intrusion detection system can dynamically collect a large amount of key information through the network and computer, and can analyze and judge the current status of the entire system environment in a timely manner.B...

November 24, 2023 No Comments READ MORE +

Which stage of network security emergency response does the above action belong to?

When a network security incident occurs, investigate intrusions, viruses or Trojans, and patch and strengthen the host. Which stage of network security emergency response does the above action belong to?A . Recovery phaseB . Detection phaseC . Eradication phaseD . Inhibition stageView AnswerAnswer: D

November 24, 2023 No Comments READ MORE +

When configuring a GRE Tunnel interface, the Destination address generally refers to which of the following parameters?

When configuring a GRE Tunnel interface, the Destination address generally refers to which of the following parameters?A . Local tunnel interface IP addressB . Local external network export IP addressC . Peer's external network egress IP addressD . Peer tunnel interface IP addressView AnswerAnswer: C

November 24, 2023 No Comments READ MORE +

After enabling the GRE keepalive function, by default, the device will periodically send keepalive messages to the peer every how many seconds?

After enabling the GRE keepalive function, by default, the device will periodically send keepalive messages to the peer every how many seconds?A . 20B . 10C . 5D . 3View AnswerAnswer: C

November 24, 2023 No Comments READ MORE +

Electronic evidence preservation is directly related to the legal validity of evidence. Only preservation that complies with legal procedures can ensure its authenticity and reliability. Which of the following is not an evidence preservation technology?

Electronic evidence preservation is directly related to the legal validity of evidence. Only preservation that complies with legal procedures can ensure its authenticity and reliability. Which of the following is not an evidence preservation technology?A . Encryption technologyB . Digital certificate technologyC . Digital signature technologyD . Message mark tracking...

November 24, 2023 No Comments READ MORE +

In Huawei SDSec solution, which layer of equipment does the firewall belong to?

In Huawei SDSec solution, which layer of equipment does the firewall belong to?A . Analysis layerB . Control layerC . Execution layerD . Monitoring layerView AnswerAnswer: C

November 24, 2023 No Comments READ MORE +

Intrusion prevention equipment can effectively defend against which of the following attacks?

Intrusion prevention equipment can effectively defend against which of the following attacks?A . Transport layerB . Application layerC . Network layerD . Physical layerView AnswerAnswer: B

November 23, 2023 No Comments READ MORE +