Question 51
The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?
Question 52
Information security is the protection of information and information systems against unauthorized access, use, disclosure, interruption, modification, destruction and thereby providing confidentiality, integrity and availability.
Question 53
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.
Question 54
In the deployment of Huawei NIP6000 products, traffic mirroring can only be performed using port mirroring.
Question 55
Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.
