Question 6
If you combine security defense with big data technology, which of the following statements are correct?
(multiple choice)
(multiple choice)
Question 7
Which of the following options are not part of the PDRR security model?
Question 8
Which of the following statements about intrusion detection/defense devices are correct? (Multiple Choice)
Question 9
Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases.
Among them, the database mainly stores the front-end detection rules and black Whitelist and other configuration files.
Among them, the database mainly stores the front-end detection rules and black Whitelist and other configuration files.
Question 10
Which of the following are the control items of HTTP behavior?) (multiple choice)