Which of the following statements are true about SYN scanning attacks?(Select All that Apply)
When gateways are connected using GRE over IPsec, the IPsec encapsulation mode must be tunnel mode.
In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?
In the figure, enterprise A and enterprise B need to communicate securely, and an IPsec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the requirements of this scenario?
Which of the following technologies does not belong to outbound intelligent uplink selection?
The Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring. It uses a modular scoring system. Which of the following is not included in the CVSS?
In a Huawei network security environment, which of the following is a key advantage of using HWTACACS over RADIUS for device management authentication?
Options:
The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.
Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)
If data filtering is configured on the firewall but is not correctly referenced in the security policy, the data that should be blocked can still be transmitted normally.
Which of the following items are recorded in the IPS service module logs of a Huawei NGFW?(Select All that Apply)
Multiple links can be deployed at the egress of an enterprise network to improve network reliability.