Question 66
The most common form of traffic-based attacks is flooding a large number of seemingly legitimate messages to the target host, eventually resulting in the exhaustion of network bandwidth or device resources.
Traffic attack packets do not include which of the following options?
Question 67
Which of the following types of attacks are DDoS attacks? 2I
Question 68
Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)
Question 69
In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed In the high-performance engine. Which of the following is not the content security detection function supported by this product?
Question 70
If Huawei USG6000 product uses its own protocol stack cache for all files passing through the device and then performs virus scanning, then the device uses a flow scan mode.
