Question 71

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?
  • Question 72

    The administrator has made the following configuration:
    1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
    2. The action of overwriting signature ID3000 is an alarm.
  • Question 73

    Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks.
    Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.
    Wen attack.
  • Question 74

    The whitelist rule of the firewall antivirus module is configured as *example*. Which of the following matches is used in this configuration?
  • Question 75

    When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.