Question 116
For APT attacks, attackers often lurk for a long time and initiate formal attacks on the enterprise at key points of the incident. APT attacks can generally be summarized in four stages:
1. Collect Information & Invasion
2. Long-term latency & mining
3. Data leakage
4. Remote control and penetration
Which of the following options is correct regarding the ordering of these four phases?
Question 117
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O
Question 118
What content can be filtered by the content filtering technology of Huawei USG6000? (Multiple choice)
Question 119
For special message attacks, which of the following option descriptions is correct?
Question 120
An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?
