최신 H12-711_V4.0 무료덤프 - Huawei HCIA-Security V4.0
The European TCSEC guidelines are divided into two modules, functional and evaluation, and are mainly used in the military, government and commercial fields.
정답: A
The hash algorithm is collision-resistant, that is, if you input different data, the output Hash value cannot be the same.
정답: B
Which of the following is not an abnormality in the file type identification results?
정답: C
Which of the following attacks is not a special message attack?
정답: D
Level protection objects refer to objects in network security level protection work. They usually refer to systems composed of computers or other information terminals and related equipment that collect, store, transmit, exchange and process information in accordance with certain rules and procedures. , mainly including basic information networks, cloud computing platforms/systems, big data applications/platforms/resources, Internet of Things, industrial control systems and systems using mobile Internet technology, etc.
정답: A
To prevent leaking the web server version, WAF can remove the () header in the HTTP Response.
정답:
server
Which of the following information systems belong to the first level of protected information systems?
(Multiple Choice)
(Multiple Choice)
정답: A,B
Which of the following are the response actions of firewall and anti-virus? (Multiple Choice)
정답: A,B,C,D
Which of the following status information can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)
정답: A,C,D
Which of the following methods can implement AD single sign-on? (Multiple Choice)
정답: A,C,D
UDP port scanning means that the attacker sends a zero-byte length UDP message to a specific port of the target host. If the port is open, an ICMP port reachable data message will be returned.
정답: B
Which of the following options correctly describes the sequence of the four phases of the Information Security Management System (ISMS)?
정답: C