Question 76

Huawei USG6000 product can virus scan and process certain file transfer protocols, but which of the following protocol does not include?
  • Question 77

    For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?
  • Question 78

    Which of the following is wrong about the 3 types of abnormalities in the file type recognition result?
  • Question 79

    Malicious code usually uses RootKit technology to hide itself. RootKit modifies the kernel of the system by loading special drivers to hide itself and specific files.
  • Question 80

    In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth, Consume equipment resources?