Question 61
Which of the following options is not a special message attack?
Question 62
When a virus is detected in an email, which of the following is not the corresponding action for detection?
Question 63
If you combine security defense with big data technology, which of the following statements are correct?
(multiple choice)
Question 64
Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address.
Question 65
Use BGP protocol to achieve diversion, the configuration command is as follows
[sysname] route-policy 1 permit node 1
[sysname-route-policy] apply community no-advertise
[sysname-route-policy] quit
[sysname]bgp10029
[sysname-bgp] peer
[sysname-bgp] import-route unr
[sysname- bgpl ipv4-family unicast
[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export
[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community
[sysname-bgp-af-ipv4] quit
[sysname-bgp]quit
Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)
