H12-711-ENU試験無料問題集「Huawei HCIA-Security V3.0 認定」

Which of the following is not a key technology for anti-virus software?

Which description about disconnect the TCP connection 4 times-handshake is wrong?

Which of the following is not in the quintuple range?

Which of the following is non-symmetric encryption algorithm?

Which of the following options does not belong to the log type of the Windows operating system?

Which of the following are the standard port numbers for the FTP protocol? (Multiple choice)

In the Client-Initiated VPN configuration, generally it is recommended to plan the address pool and the headquarters of the network address for the different network segments, or need to open proxy forwarding on the gateway device.

Which of the following statements about IPSec SA is true?

Which of the following is not part of the method used in the Detection section of the P2DR model?

Check the firewall HRP status information as follows:
HRP_S [USG_ B] display hrp state
16 : 90 : 13 2010/11/29
The firewall's config state is : SLAVE
Current state of virtual routers configured as slave
GigabitEthernet0/0/0 vird 1 : slave
GigabitEthernet0/0/1 vied 2 : slave
Which of the following description is correct?

Which of the following statement is wrong about NAT?

The single-point login function of the online user, the user authenticates directly to the AD server, and the device does not interfere with the user authentication process. The AD monitoring service needs to be deployed on the USG device to monitor the authentication information of the AD server.

Which of the following statement is wrong about L2TP VPN?

Social engineering is a means of harm such as deception, injury, etc. through psychological traps such as psychological weakness, instinctive reaction, curiosity, trust, and greed.

Which of the following is the correct description of the investigation and evidence collection?

The process of electronic forensics includes: protecting the site, obtaining evidence, preserving evidence, identifying evidence, analyzing evidence, tracking and presenting evidence.

UDP port scanning means that the attacker sends a zero-byte UDP packet to a specific port of the target host. If the port is open, it will return an ICMP port reachable data packet.

Security technology has different methods at different technical levels and areas. Which of the following devices can be used for network layer security protection? (Multiple choice)

正解:A,B,D 解答を投票する
In IPSEC VPN, which of the following scenarios can be applied by tunnel mode?

Which of the following is true about the description of the firewall?