Which of the following statements about IPS is wrong?
A. When the "source security zone" is the same as the "destination security zone", it means that the IPS policy is applied in the domain.
B. Modifications to the PS policy will not take effect immediately. You need to submit a compilation to update the configuration of the IPS policy.
C. The signature set can contain either predefined signatures or custom signatures. 832335
D. The priority of the coverage signature is higher than that of the signature in the signature set.
正解:C
質問 2:
Regarding HTTP behavior, which of the following statements is wrong?
A. When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management And block behavior.
B. HTTP POST is generally used to send information to the server through a web page, such as forum posting x form submission, username I password login.
C. When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST operate.
D. When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.
正解:C
質問 3:
Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks.
Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.
Wen attack.
A. False
B. True
正解:B
質問 4:
Regarding the sequence of the mail transmission process, which of the following is correct?
1. The sender PC sends the mail to the designated SMTP Server.
2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail
3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver
4. The recipient sends an email.
A. 1->4->3
B. 1->2->4,
C. 1->2->3
D. 1->3->2
正解:B
質問 5:
Which of the following signature attributes cannot be configured for IP custom signature?
A. ID
B. Agreement
C. Message length
D. Direction
正解:C
質問 6:
In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?
A. Leak the acquired key data information to a third party of interest
B. The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
C. Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
D. Long-term latency and collection of key data.
正解:B
質問 7:
IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?
A. IPS must use bypass deployment in the network
B. IPS unifies IDS and firewall
C. Common IPS deployment modes are in-line deployment,
D. IPS is an intrusion detection system that can block real-time intrusions when found
正解:A
質問 8:
The administrator has made the following configuration:
1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
2. The action of overwriting signature ID3000 is an alarm.
A. The signature set is not related to the coverage signature
B. The action of signing ID3000 is to block
C. Unable to determine the action of signature ID3000
D. The action of signing iD3000 is an alarm
正解:D
Aizawa -
有難いPass4Testさんに出会って本当に感謝しかありません!Pass4Testさんこれからもお世話になります。