Question 21

Which of the following signature attributes cannot be configured for IP custom signature?
  • Question 22

    UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.
    Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?
  • Question 23

    Which of the following options are common reasons for IPS detection failure? (multiple choices)
  • Question 24

    What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)
  • Question 25

    If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More select)