Why APT attacks are difficult to defend? Part of the reason is that they use zero-day loopholes to attack. This zero-day loopholes usually takes a lot of time to research and analyze and make corresponding defense methods. A . True B . False
What are the risks to information security caused by unauthorized access? (Multiple choices) A . Confidentiality B . Integrity C . Availability D . recoverability
Network attacks are classified into two types: single-packet attacks and traffic-based attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks and special packet attacks. A . True B . False
Which of the following attacks are belong to attacks against Web servers? (Multiple choices) A . Website fishing fraud B . Website Trojan C . SQL injection D . Cross-site scripting attacks
Huawei WAF products mainly consist of implementing front-end, back-end central systems and databases. The database mainly stores the front-end detection rules and black and white list configuration files. A . True B . False
Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address. A . True B . False
Regarding the process of file filtering, which of the following statements is wrong? A . After the file extraction fails, the file will still be filtered. B . The application identification module can identify the type of application hosting the file. C . Protocol decoding is responsible for parsing the file data and file transfer directions in the data stream. D . The file type identification module is responsible for identifying the real type of the file and the extension of the file based on the file data
The following figure shows the configuration of the URL filtering configuration file. Which of the following statements is true about this configuration?
A . The firewall will check the blacklist first and then check the whitelist. B . Assume that user visit www.exzample.com, which is part of Humanities and Social Networking category. At this time, the user cannot access the site. C . The user visit the website www.exzample.com. When there is no black and white list of hits, the predefined URL category entry is next queried. D . The default action means that all websites allow access. Therefore, this configuration error.
Which of the following attacks are belong to attacks against Web servers? (Multiple choices) A . Website fishing fraud B . Website Trojan C . SQL injection D . Cross-site scripting attacks
If the user’s FTP operation matches the FTP filtering policy, which actions can be performed? (Multiple choice) A . Blocking B . Announcement C . Alerts D . Execution