H12-722 Exam Question 76
When users deploy a firewall anti-virus policy, there is no need to deploy anti-virus software.
H12-722 Exam Question 77
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
H12-722 Exam Question 78
When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.
H12-722 Exam Question 79
The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?
H12-722 Exam Question 80
Regarding the sequence of file filtering technology processing flow, which of the following is correct?
(1) The security policy is applied as permit
(2) Protocol decoding
(3) File type recognition
(4) Application recognition
(5) File filtering
(1) The security policy is applied as permit
(2) Protocol decoding
(3) File type recognition
(4) Application recognition
(5) File filtering