Question 36

The user needs of a university are as follows:
1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
3. At the same time, some pornographic websites in the student area are prohibited.
The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?
  • Question 37

    The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide Analyze the suspicious object, which of the following options are its main features? (multiple choices)
  • Question 38

    Which of the following is correct about enhanced mode in HTTP Flood Source authentication? (Multiple selection)
  • Question 39

    Traditional firewalls have weak application layer analysis and processing capabilities, and cannot correctly analyze malicious code that is doped in the allowable application data stream. Many attacks or malicious behavior often use firewall open application data streams to cause damage, resulting in application layers threat can penetrate the firewall.
  • Question 40

    Attacks against the Web can be divided into three attacks on the client, server or communication channel.