Huawei H12-722 - Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)
Which of the following is not an abnormal situation of the file type recognition result?
Regarding the processing process of file overwhelming, which of the following statements is correct?
The following commands are configured on the Huawei firewall:
[USG] firewall defend ip-fragment enable
Which of the following situations will be recorded as an offensive behavior? (multiple choice)
Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.
Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)
If the regular expression is "abc. de", which of the following will not match the regular expression?
Which of the following files can the sandbox detect? (multiple choice)
The results of the RBL black and white list query on the firewall are as follows:
Based on the above information only, which of the following statements is correct? (multiple choice)
Which of the following options are common behavioral characteristics of viruses? (multiple choices)
Regarding the sequence of the mail transmission process, which of the following is correct?
1. The sender PC sends the mail to the designated SMTP Server.
2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail
3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver
4. The recipient sends an email.