Question 31
Which of the following is correct about the order of the file filtering technology process?
(1) Security policy application is permit
(2) Protocol decoding
(3) File Type Identification
(4) Application identification
(5) File Filtering
Question 32
Which of the following is correct about special packets attack?
Question 33
The status code in the HTTP response message describes the type of response message. There are many possible values.
Which of the following status codes indicates that the resource requested by the client does not exist?
Question 34
Which of the following statements is wrong about the content filtering configuration of Huawei USG6000?
Question 35
For SYN flood attacks, TCP source authentication and TCP proxy can be used for defense.
Which of the following description is correct?
