Question 91
The DDoS attack defense configuration process is as follows:
1, start the flow statistics function;
2. Set different protection thresholds for different types of attacks;
3. When the traffic exceeds the preset threshold, the system starts attack defense.
Question 92
A college user needs are as follows:
1. The environmental traffic is relatively large and can add up to 800M in both directions. Huawei USG6000 series firewalls are deployed at its network nodes.
2. The intranet is divided into student areas, server areas, etc. Users are most concerned about the security of the server area and avoid being attacked by various types of threats.
3. At the same time, some pornographic websites in the student district are prohibited.
The external network is configured as untrust zone on the firewall, and the internal network is configured as trust zone. How to configure the firewall to meet the above requirements? (Multiple choices)
Question 93
Which of the following are true about the description of keywords? (Multiple Choices)
Question 94
After the IP policy is enabled, some services are found to be inaccessible. Which of the following may be the cause? (Multiple Choice)
Question 95
IPS function of Huawei USG6000 product supports two response modes of blocking and alarming.
