Which of the following options is not included aboutHRP in the content of the master/slave configuration consistency check?
existUSGOn the series firewall, configurewebAfter the redirection function is enabled, the authentication page cannot pop up. Which of the following is not the cause of the failure?
Evidence identification needs to address the verification of the integrity of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the criteria for identification of evidence?
Questionnaire design principles do not include which of the following?
againstIPspoofing attack (IP Spoofing), which of the following is an error?
Digital certificates can be divided into local certificates,CAcertificates, root certificates, self-signed certificates, etc.
Which of the following configurations can achieveNAT ALGFeatures?
Which of the following options is not included in the survey respondents in the security assessment method?
aboutNATThe configuration commands for the address pool are as follows:no-patThe meaning of the parameters is:
aboutwindowslog, which of the following descriptions is false?
Which of the following are remote authentication methods? (multiple choice)
Which of the following protocols can guarantee the confidentiality of data transmission? (multiple choice)
aboutSSL VPNdescription, which of the following is correct?
EuropeTCSECThe guidelines are divided into two modules, functional and evaluation, and are mainly used in the military, government and commercial fields
The matching principle of the security policy is: first search for the manually configured interzone security policy, and if no match is found, the data packet will be discarded directly.
Which of the following is not a key technology of antivirus software?
Which of the following options are application risks (multiple choice)
Which of the following does not fall into the category of cybersecurity incidents?
aboutClient-Initiated VPN, which of the following statements is true? (multiple choice)
If the administrator uses the defaultdefaultThe authentication domain verifies the user, and the user only needs to enter the user name when logging in; if the administrator uses the newly created authentication domain to authenticate the user, the user needs to enter the user name when logging in."username@Certified domain name"
During the use of the server, there are various security threats. Which of the following options is not a server security threat?
aboutNATAddress translation, which of the following statements is false?
As shown in the figure, the clientAand serverBestablished betweenTCPconnection, two places in the figure"?"The message sequence number should be which of the following?
Intrusion Prevention System (IPS,intrusion prevention system) is a defense system that can block in real time when an intrusion is detected
existUSGConfiguration on the series firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?
Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*
In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*
Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*
IPSec VPNs use pre-shared keys, ( ) and digital envelopes to authenticate peers. (fill in the blank)
Which of the following descriptions of the firewall log is wrong?
Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*
When an access user uses Client-InitiatedVPN to establish a tunnel with the LNS, how many PPP connections can one tunnel carry?
In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)
The protocol number of the transport layer protocol TCP is ( ) (fill in the blank)
Which of the following options is not a private network IP address?
Regarding the description of the firewall security zone and interface relationship, which of the following options is correct? (multiple choice)
Please sort the following digital envelope encryption and decryption process correctly.
Which of the following descriptions about digital fingerprints in digital signatures is wrong?
An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*
The method of collecting information by port scanning using scanning tools belongs to the means of ( ) analysis. (fill in the blank)
Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*
With the development of technology, some new technologies have emerged in electronic forensics. Which of the following items are new forensics technologies?
Which of the following protocols cannot be encrypted by SSL VPN?
After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information
HRP_M
Role: active, peer: active
Running priority:45000, peer:45000
Backup channel1 usage: 30x
Stab1 e time: 1days, 13 hours, 35 minutes
Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal
(active).local priority F 4
peer_priority 45000.
Configuration:
hello interval: 1000ms
preempt: 60s
mirror configuration:off
mirror session:on
track trunk member:on
auto-sync configuration:on
auto-sync connection- status:on
adjust ospf cost:on
adjust ospfv3-cost:on
adjust bgp-cost:on
nat resource: off
Detail information on:
Gigabi tEthernet0/0/1:up
Gigabi tEthernet0/0/3:up
ospf-cost: +0
then the command he typed in the blank is[fill in the blank]*
When a network security incident occurs, investigate the intrusion behavior, virus or Trojan horse, and repair and strengthen the host. Which of the above actions belong to the work content of the network security emergency response?
When an access user uses Client-InitiatedVPN to establish a tunnel with the LNS, how many PPP connections can a tunnel carry?
Which of the following NAT technologies is a destination NAT technology?
____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*
Which of the following security measures does the monitor correspond to?
If internal employees access the Internet through the firewall and find that they cannot connect to the Internet normally, what viewing commands can be used on the firewall to troubleshoot the interface, security zone, security policy and routing table? (Write any viewing command, requiring: the words on the command line must be complete and correct to score, and cannot be omitted or abbreviated)[fill in the blank]*
Please order the following steps according to the graded protection process.[fill in the blank]
The reason why NAPT can realize one-to-many address translation is that the ______ is also translated when the address is translated, so multiple private addresses can share the same public address.[fill in the blank]*
at HuaweiSDSecIn the solution, which of the following options belong to the device of the executive layer? (multiple choice)
What is the corresponding warning level for major network security incidents?
When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*
If users from the external network (where the security zone is Untrust) are allowed to access the intranet server (where the security zone is DMZ), the destination security zone selected when configuring the security policy is ______.[fill in the blank]*
Applying for special funds for emergency response and purchasing emergency response software and hardware equipment belong to the work content of which stage of the network's complete emergency response?
Personal information leakage is the destruction of the ______ characteristics of information.[fill in the blank]*
HRP(Huawei Redundancy Protocol) protocol, which is used to synchronize data such as key configuration and connection status of the firewall to the standby firewall, which of the following options does not belong to the scope of synchronization?
RFC (Request For Comment) 1918 reserves 3 IP addresses for private use, namely 10.0.0.0-10.255.255.255, ______, 192.168.0.0-192.168.255.255[fill in the blank]*
Regarding the description of the operating system, which of the following is false?
Which of the following is not a stand-alone anti-virus technology? ( )[Multiple choice]*
B. Configure anti-virus technology on network firewall
C. Use virus detection tools
D. Patch the system
Huawei's Agile-Controller products belong to ______ in the HiSec solution.[fill in the blank]
Single sign-on function for Internet users, users directlyADServer authentication, the device does not interfere with the user authentication process,ADMonitoring services need to be deployed inUSGequipment, monitoringADAuthentication information of the server
Which of the following information is not the backup content included in the status information backup in the dual-system hot backup? ( )[Multiple choice]*
Please match the whole worm attack process and attack description.[fill in the blank]*
Which of the following attacks is not a special packet attack?
The steps of the security assessment method do not include which of the following?
When the user uses the session authentication method to trigger the firewall built-inPortalDuring authentication, users do not actively perform identity authentication, advanced service access, and device push"redirect"to the certification page
The attacker sends a SYN message with the same source address and destination address, or the source address is the loopback address to the target host (the source port and destination port are the same, causing the attacker to send a SYN-AKY message to its own address) What kind of attack is this behavior black? ( )[Multiple choice]*
In which of the following scenarios does the firewall generate the Server map table? ( )