Why APT attacks are difficult to defend? Part of the reason is that they use zero-day loopholes to attack. This zero-day loopholes usually takes a lot of time to research and analyze and make corresponding defense methods.

Why APT attacks are difficult to defend? Part of the reason is that they use zero-day loopholes to attack. This zero-day loopholes usually takes a lot of time to research and analyze and make corresponding defense methods.A . TrueB . FalseView AnswerAnswer: A

March 21, 2019 No Comments READ MORE +

What are the risks to information security caused by unauthorized access? (Multiple choices)

What are the risks to information security caused by unauthorized access? (Multiple choices)A . ConfidentialityB . IntegrityC . AvailabilityD . recoverabilityView AnswerAnswer: AB

March 1, 2019 No Comments READ MORE +

Network attacks are classified into two types: single-packet attacks and traffic-based attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks and special packet attacks.

Network attacks are classified into two types: single-packet attacks and traffic-based attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks and special packet attacks.A . TrueB . FalseView AnswerAnswer: A

February 26, 2019 No Comments READ MORE +

Which of the following attacks are belong to attacks against Web servers? (Multiple choices)

Which of the following attacks are belong to attacks against Web servers? (Multiple choices)A . Website fishing fraudB . Website TrojanC . SQL injectionD . Cross-site scripting attacksView AnswerAnswer: CD

February 21, 2019 No Comments READ MORE +

Huawei WAF products mainly consist of implementing front-end, back-end central systems and databases. The database mainly stores the front-end detection rules and black and white list configuration files.

Huawei WAF products mainly consist of implementing front-end, back-end central systems and databases. The database mainly stores the front-end detection rules and black and white list configuration files.A . TrueB . FalseView AnswerAnswer: A

February 3, 2019 No Comments READ MORE +

Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address.

Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address.A . TrueB . FalseView AnswerAnswer: A

January 12, 2019 No Comments READ MORE +

Regarding the process of file filtering, which of the following statements is wrong?

Regarding the process of file filtering, which of the following statements is wrong?A . After the file extraction fails, the file will still be filtered.B . The application identification module can identify the type of application hosting the file.C . Protocol decoding is responsible for parsing the file data and...

January 3, 2019 No Comments READ MORE +

The following figure shows the configuration of the URL filtering configuration file. Which of the following statements is true about this configuration?

The following figure shows the configuration of the URL filtering configuration file. Which of the following statements is true about this configuration? A . The firewall will check the blacklist first and then check the whitelist.B . Assume that user visit www.exzample.com, which is part of Humanities and Social Networking...

December 24, 2018 No Comments READ MORE +

Which of the following attacks are belong to attacks against Web servers? (Multiple choices)

Which of the following attacks are belong to attacks against Web servers? (Multiple choices)A . Website fishing fraudB . Website TrojanC . SQL injectionD . Cross-site scripting attacksView AnswerAnswer: CD

December 13, 2018 No Comments READ MORE +

If the user's FTP operation matches the FTP filtering policy, which actions can be performed? (Multiple choice)

If the user's FTP operation matches the FTP filtering policy, which actions can be performed? (Multiple choice)A . BlockingB . AnnouncementC . AlertsD . ExecutionView AnswerAnswer: AC

December 8, 2018 No Comments READ MORE +