Join the discussion
Question 1/110
If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?
Correct Answer: C
Add Comments
- Other Question (110q)
- Q1. If the processing strategy for SMTP virus files is set to alert, which of the following op...
- Q2. Which of the following options is not a feature of Trojan horses?...
- Q3. After the user is successfully authenticated, Agile Controller-Campus Which of the followi...
- Q4. Which of the following options is not a special message attack?...
- Q5. Import the user information of the AD server on the Agile Controller-Campus to realize the...
- Q6. Portal At the time of certification, pass Web After the browser enters the account passwor...
- Q7. Huawei's USG000 product can identify the true type of common files and over-check the cont...
- Q8. For the scenario where the authentication server adopts distributed deployment, which of t...
- Q9. Intrusion detection is a network security technology used to detect any damage or attempt ...
- Q10. Which of the following options is not a defense against HTTP Flood attacks?...
- Q11. When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+S...
- Q12. Which of the following options does not belong to the security risk of the application lay...
- Q13. Which of the following options belong to a third-party server account? (Multiple choice)...
- Q14. Regarding the identity authentication method and authentication type, which of the followi...
- Q15. When performing terminal access control, the authentication technology that can be used do...
- Q16. If the self-determined meter function is enabled on the Agile Controller-Campus and the ac...
- Q17. Regarding scanning and snooping attacks, which of the following descriptions is wrong?...
- Q18. In centralized networking, database,SM server,SC server\ AE Servers are centrally installe...
- Q19. Which patches does Policy Center support to management?(Choose 3 answers)...
- Q20. In order to protect the security of data transmission, more and more websites or companies...
- Q21. In the visitor reception hall of a company, there are many temporary terminal users, and t...
- Q22. Agile Controller-Campus The system architecture belongs to C/S Architecture....
- Q23. User access authentication technology does not include which of the following options?...
- Q24. The user accesses the network through the network access device, and the third-party RADIU...
- Q25. Regarding the description of the ACL used in the linkage between SACG equipment and the TS...
- Q26. VIP Experience guarantee, from which two aspects are the main guarantees VIP User experien...
- Q27. After enabling the IP policy, some services are found to be unavailable. Which of the foll...
- Q28. Single-packet attacks are divided into scanning and snooping attacks, malformed packet att...
- Q29. Terminal security access technology does not include which of the following options?...
- Q30. Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identity a...
- Q31. For full encryption registered mobile storage devices must be formatted to normal use in n...
- Q32. Which of the following options is for Portal The statement of the gateway access process i...
- Q33. Part of the reason why the APT attack becomes difficult to defend is that it uses the vuln...
- Q34. Business accompanying is-A special access control method, according to the user's access l...
- Q35. On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of...
- Q36. Fage attack means that the original address and target address of TOP are both set to the ...
- Q37. Which of the following options are relevant to MAC Certification and MAC The description o...
- Q38. If you use a normal account for authentication, which of the following descriptions is wro...
- Q39. Regarding the description of intrusion detection technology, which of the following statem...
- Q40. Misuse detection is through the detection of similar intrusions in user behavior, or those...
- Q41. Huawei NIP6000 products have zero-setting network parameters and plug-and-play functions, ...
- Q42. In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal...
- Q43. Place refers to the terminal environment when end-user use strategy management center acce...
- Q44. When a data file hits the whitelist of the firewall's anti-virus module, the firewall will...
- Q45. The results of the RBL black and white list query on the firewall are as follows: (Exhibit...
- Q46. Which of the following elements does PDCA include? (Choose 3 answers)...
- Q47. When the -aa command is used on the access control device to test the connectivity with th...
- Q48. Which of the following are the control items of HTTP behavior?) (multiple choice)...
- Q49. Content filtering is a security mechanism for filtering the content of files or applicatio...
- Q50. About the hardware SACG Certification deployment scenarios, which of the following descrip...
- Q51. Mobile smartphone, tablet PC users through Any Office Client and AE Establish IPSec Encryp...
- Q52. The virus signature database on the device needs to be continuously upgraded from the secu...
- Q53. When the account assigned by the administrator for the guest is connected to the network, ...
- Q54. Hardware in useSACG At the time of certification,SACG After the configuration is completed...
- Q55. For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. W...
- Q56. For the convenience of visitors, different authentication and master pages can be distribu...
- Q57. Which of the following options belongs to MC prioritized pail Authentication application s...
- Q58. For the basic mode of HTTP Flood source authentication, which of the following options are...
- Q59. For the terminal Wi-Fi The order of the push, which of the following is correct? 1. Any Of...
- Q60. Regarding the policy for checking account security, which of the following descriptions ar...
- Q61. When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse pro...
- Q62. Which of the following options are relevant to Any Office The description of the solution ...
- Q63. Server Fault information collection tool Server Collector, which of the following does col...
- Q64. Anti-DDoS defense system includes: management center, detection center and cleaning center...
- Q65. Which of the following are typical intrusions? "Multiple choice)...
- Q66. An account can belong to multiple roles, that is, a user may hold multiple positions....
- Q67. A network adopts Portal Authentication, the user finds the pushed Web No username entered ...
- Q68. Which way can NAC Agent upgrade package be deployed?...
- Q69. Network attacks are mainly divided into two categories: single-packet attacks and streamin...
- Q70. Since the sandbox can provide a virtual execution environment to detect files in the netwo...
- Q71. Based on the anti-virus gateway of streaming scan, which of the following descriptions is ...
- Q72. In the terminal security management, the black and white list mode is used to check the te...
- Q73. IPS is an intelligent intrusion detection and defense product. It can not only detect the ...
- Q74. When using local guest account authentication, usually use(Portal The authentication metho...
- Q75. Which of the following technology, administrators can according to business requirements, ...
- Q76. The anti-virus feature configured on the Huawei USG6000 product does not take effect. Whic...
- Q77. Secure email is Any ffice Solution for corporate office 0A The killer application provided...
- Q78. Visitor management can authorize visitors based on their account number, time, location, t...
- Q79. Which of the following descriptions are correct for proxy-based anti-virus gateways? (mult...
- Q80. Which of the following statement on the scanner is wrong?...
- Q81. Regarding the definition of WIPS/WIDS, which of the following statements is correct?...
- Q82. Which of the following options is correct for the description of the role of the isolation...
- Q83. In a centralized networking, the database, SM server, SC server, and AE server are all cen...
- Q84. Which of the following is not an abnormal situation of the file type recognition result?...
- Q85. In the anti-virus policy configuration of Huawei USG6000 product, what are the response me...
- Q86. Windows in environment,Agile Controller-Campus After the installation is successful, how t...
- Q87. The AD/LDAP account can be synchronized to the Agile Controller-Campus or not to the Agile...
- Q88. Which of the following threats cannot be detected by IPS?...
- Q89. Regarding the processing flow of file filtering, which of the following statements is wron...
- Q90. Which of the following options is not a challenge brought by mobile office?...
- Q91. Which of the following is the correct configuration idea for the anti-virus strategy? 1. L...
- Q92. There is a three-layer forwarding device between the authentication client and the admissi...
- Q93. The traditional campus network is based on IP As the core network, if there are mobile off...
- Q94. An account can only belong to one user group, that is, a user can only belong to one depar...
- Q95. When managing guest accounts, you need to create a guest account policy and set the accoun...
- Q96. The status code in the HTTP response message indicates the type of the response message, a...
- Q97. Regarding asset management, which of the following descriptions is wrong?...
- Q98. A network adopts 802. 1X To authenticate access users, the access control equipment is dep...
- Q99. Which of the following options are common reasons for IPS detection failure? (multiple cho...
- Q100. The following is the 802.1X access control switch configuration: [S5720]dot1x authenticati...
- Q101. After configuring the announcement,Agile Controller-Campus The system cannot assign this a...
- Q102. In the terminal security all-round defense system, use PPT-PDCA The model can effectively ...
- Q103. Traditional network single--The strategy is difficult to cope with the current complex sit...
- Q104. Viruses can damage computer systems. v Change and damage business data: spyware collects, ...
- Q105. The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping...
- Q106. Which of the following options is wrong for the description of the cleaning center?...
- Q107. Which of the following series of devices does not support the function of accompanying bus...
- Q108. Terminal fault diagnosis tool can diagnose fault, also can collect terminal information....
- Q109. In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use...
- Q110. For the description of URPF technology, which of the following options are correct? (multi...
