The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?
A. The weight value is 10, and the page cannot be accessed
B. The weight value is 10, you can ask the web page before
C. The weight value is 8, the page cannot be accessed
D. The weight value is 8, you can visit the web page
正解:D
質問 2:
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack.
This kind of zero-day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.
A. False
B. True
正解:B
質問 3:
In the process of establishing CAPWAP channel between AP and AC, AP and AC negotiate to establish CAPWAP tunnel. In this process, CAPWAP tunnel is established.
Use DTLS to encrypt and transmit UDP packets. What are the encryption methods supported by DTLS?
(multiple choice)
A. Certificate encryption
B. AES encryption
C. PSK encryption
D. Plaintext encryption
正解:A,C
質問 4:
For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
A. HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.
B. HTTPS Flood defense can perform source authentication by limiting the request rate of packets.
C. The principle of HTTPS Flood attack is to request URIs involving database operations or other URIs that consume system resources, causing server resource consumption. Failed to respond to normal requests.
D. The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to the target server, causing the server resources to be exhausted and unable to respond to regular requests.
正解:B,C,D
質問 5:
The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.
A. False
B. True
正解:B
質問 6:
For the description of the Anti DDOS system, which of the following options is correct? C
A. The firewall can only be used for inspection equipment
B. The detection center is mainly to pull and clean the attack flow according to the control strategy of the security management center, and re-inject the cleaned normal flow back to the customer.
User network, send to the real destination.
C. The main function of the Green Washing Center is to detect and analyze DDoS attack traffic on the flow from mirroring or splitting, and provide analysis data to The management center makes a judgment.
D. The management center mainly completes the processing of attack events, controls the drainage strategy and cleaning strategy of the cleaning center, and responds to various attack events and attack flows.
View in categories and generate reports.
正解:D
質問 7:
If you combine security defense with big data technology, which of the following statements are correct?
(multiple choice)
A. In the detection process, the characteristics of unknown samples need to be extracted and calculated to provide samples for subsequent static comparisons.
B. In the learning process, you should start from collecting samples, analyze their characteristics and then perform machine learning.
C. Security source data can come from many places, including data streams, messages, threat events, logs, etc.
D. Machine learning only counts a large number of samples, which is convenient for security administrators to view.
正解:A,B,C
質問 8:
About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)
A. SACG Essentially through 802.1X Technology controls access users.
B. SACG Authentication is generally used in scenarios where a stable network performs wired admission control.
C. SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.
D. SACG It is generally deployed in a bypass mode without changing the original network topology.
正解:B,D
伏见** -
高い点数でH12-724試験に合格しましたことがわかって、大変嬉しいです!Pass4Testに助けれてくれて、本当にありがとうございます!