Question 66
The most common form of traffic-based attacks is flooding a large number of seemingly legitimate messages to the target host, eventually resulting in the exhaustion of network bandwidth or device resources.
Traffic attack packets do not include which of the following options?
Traffic attack packets do not include which of the following options?
Question 67
If Huawei USG6000 product uses its own protocol stack cache for all files passing through the device and then performs virus scanning, then the device uses a flow scan mode.
Question 68
When a device identifies a keyword during content filtering detection, what response actions can the device perform? (Multiple Choice)
Question 69
Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules To detect intrusions in the system. Which of the following is not a feature of misuse detection 2
Question 70
After the cleaning device establishes a BGP neighbor relationship with the peer router, uses BGP traffic diversion and policy routing reinjection, what configuration needs to be performed on the cleaning device? (Multiple Choice)