DRAG DROP
Match each of the following application layer service protocols with the correct transport layer
protocols and port numbers.
Explanation:
Which of the following attack methods is to construct special SQL statements and submit sensitive
information to exploit program vulnerabilities
B
A Web server is deployed in an enterprise intranet to provide Web access services to Internet users,
and in order to protect the access security of the server, it should be divided into the _____ area of
the firewall.
A
At what layer does packet filtering technology in the firewall filter packets?
B
As shown in the figure, the administrator needs to test the network quality of the 20.0.0/24 CIDR
block to the 40.0.0/24 CIDR block on Device B, and the device needs to send large packets for a long
time to test the network connectivity and stability.
B
WAF can accurately control and manage users' online behavior and user traffic.
A
ARP man-in-the-middle attacks are a type of spoofing attack technique.
A
DRAG DROP
Please classify the following security defenses into the correct classification.
Explanation:
Regarding the characteristics of the routing table, which of the following items is described correctly
C, D
When the Layer 2 switch receives a unicast frame and the MAC address table entry of the switch is
empty, the switch discards the unicast frame.
B
Among the various aspects of the risk assessment of IS027001, which of the following does not
belong to the system design and release process?
A
Which of the following types of malicious code on your computer includes?
A, B, C, D
For which of the following parameters can the packet filtering firewall filter?
B, D
What is the security level of the Untrust zone in Huawei firewalls?
C
Which layer of the protocol stack does SSL provide end-to-end encrypted transmission services?
D