Question 46
Which of the following options is not a cyber security threat caused by weak personal security awareness?
Question 47
File filtering technology can filter files based on their application, file transfer direction, file type, and file extension.
Question 48
In the security protection system of cloud era, reforms must be carried out in advance, in the event, and afterwards, and continuous improvement and development of closed loops must be formed.
Which of the following key points should be fulfilled in "in the matter"? (Multiple choices)
Question 49
Misuse detection discovers intrusion activity in system by detecting similar behaviors of user intrusions, or by detecting violations of system security rules indirectly by exploiting system flaws.
Which of the following is not misuse detection feature?
Question 50
What content can be filtered by the content filtering technology of Huawei USG6000 products?
