Question 56
Which of the following are the keyword matching patterns? (Multiple Choice)
Question 57
Anomaly detection establishes the normal behavior characteristics of the system's main body through analysis of system audit data: In the detection, if the audit data in the system is different from the normal behavior characteristics of the established subject, it is considered an intrusion behavior. Which of the following can be used as the system body? (Multiple choices)
Question 58
Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)
Question 59
For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
Question 60
What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)
