최신 H12-711_V4.0 무료덤프 - Huawei HCIA-Security V4.0
Manual audit is a supplement to tool evaluation. It does not require the installation of any software on the target system being evaluated and has no impact on the operation and status of the target system.
Manual audit does not include which of the following options?
Manual audit does not include which of the following options?
정답: A
In the USG series firewall, you can use which of the following function to provide well-known application services for non-well-known ports?
정답: A
Predefined signatures are signatures included in the intrusion prevention signature database. The contents of predefined signatures (except actions) are not fixed and can be created, modified or deleted.
정답: B
Information security level protection is to improve the overall security level of the country, and at the same time reasonably optimize the allocation of security resources to maximize security and economic benefits.
정답: A
The default policy on the firewall is () all traffic
정답:
Reject
After a network intrusion event occurs, obtain the identity of the intruder, attack source and other information according to the plan, and block the intrusion behavior. Which links in the PDRR network security model do the above actions belong to? (Multiple Choice)
정답: B,C
The hash algorithm is collision-resistant, that is, if you input different data, the output Hash value cannot be the same.
정답: B
In the process of establishing IPsec VPN between peers FWA and FW B, they need to go through two stages to establish two types of security associations. In the first stage, establish () and verify the identity of the peers.
정답:
IKE SA
In a PKI system, the CA certificate cannot be a self-signed certificate.
정답: B
To configure the NAT policy in the command line mode, you need to use it in the system view.
Command () to enter the NAT policy configuration view.
Command () to enter the NAT policy configuration view.
정답:
nat-policy
According to the HiSec solution, please drag the device on the left into the logical architecture layer to which it belongs on the right.
정답:
CIS - Analyzer
SecoManager - Controller
Switch - actuator
SecoManager - Controller
Switch - actuator
Regarding the description of the grading of the medium-level protection system in MSW 2.0, which of the following options are correct? (Multiple Choice)
정답: A,C,D
Which of the following options are suitable for business travelers to access the corporate intranet in a public network environment? (Multiple Choice)
정답: B,C
The attacker sends an ICMP reply request and sets the destination address of the request packet to the broadcast address of the victim network.
What kind of attack does this behavior belong to?
What kind of attack does this behavior belong to?
정답: C