The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.
Signs: The workflow for the WAF tamper-proof module has the following steps:.
① WAF uses the pages in the cache to return to the client;
②WAF compares the watermark of the server page content with the page content in the cache
③Store the content of the page in the cache after learning
④ When the user accesses the Web page, the WAF obtains the page content of the server
⑤WAF starts the learning mode to learn the page content of the user's visit to the website;
For the ordering of these steps, which of the following options is correct?
Regarding traditional firewalls, which of the following statements are correct? (multiple choice)
Which of the following are typical intrusions? "Multiple choice)
Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
Anti-DDoS defense system includes: management center, detection center and cleaning center.
If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses
It is the stream scanning method.
Regarding the anti-spam local black and white list, which of the following statements is wrong?
Which of the following options is not a cyber security threat caused by weak personal security awareness?
When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)