Question 66

The most common form of traffic-based attacks is flooding a large number of seemingly legitimate messages to the target host, eventually resulting in the exhaustion of network bandwidth or device resources.
Traffic attack packets do not include which of the following options?
  • Question 67

    If Huawei USG6000 product uses its own protocol stack cache for all files passing through the device and then performs virus scanning, then the device uses a flow scan mode.
  • Question 68

    When a device identifies a keyword during content filtering detection, what response actions can the device perform? (Multiple Choice)
  • Question 69

    Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules To detect intrusions in the system. Which of the following is not a feature of misuse detection 2
  • Question 70

    After the cleaning device establishes a BGP neighbor relationship with the peer router, uses BGP traffic diversion and policy routing reinjection, what configuration needs to be performed on the cleaning device? (Multiple Choice)