Question 71
A business administrator wants to prevent employees from accessing shopping websites during business hours. A URL filtering configuration file was then configured to select the shopping site in the predefined category as blocked. However, employee A can still use the company's network to shop online during the lunch break.
What are the possible reasons for the following? (Multiple choices)
What are the possible reasons for the following? (Multiple choices)
Question 72
Which of the following are the keyword matching patterns? (Multiple Choice)
Question 73
During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
Question 74
The RBL black and white list query result on the firewall is as follows:

Based on the above information, which of the following statements is correct? (Multiple choices)

Based on the above information, which of the following statements is correct? (Multiple choices)
Question 75
The Huawei USG6000 product can identify the actual types of common files and filter inspection to content. Even if the file is hidden in a zip file, or if you change the extension, you can't escape the eyes of the firewall.