H12-711試験無料問題集「Huawei HCIA-Security V3.0 認定」

After the network intrusion event occurs, according to the plan to obtain the identity of the intrusion, the attack source and other information, and block the intrusion behavior, which links of the above actions are involved in the PDRR network security model? (Multiple Choice)

Which of the following are international organizations related to information security standardization? (Multiple Choice)

正解:A,B,D 解答を投票する
Which of the following are key elements of information security prevention? (Multiple choice)

正解:A,B,C,D 解答を投票する
UDP port scanning means that the attacker sends a zero-byte UDP packet to a specific port of the target host. If the port is open, it will return an ICMP port reachable data packet.

Which of the following description about the VGMP protocol is wrong?

The preservation of electronic evidence is directly related to the legal effect of evidence, and it is in conformity with the preservation of legal procedures, and its authenticity and reliability are guaranteed. Which of the following is not an evidence preservation technique?

Which of the following attacks is not a special packet attack?

In order to obtain evidence of crime, it is necessary to master the technology of intrusion tracking. Which of the following descriptions are correct about the tracking technology? (Multiple Choice)

正解:A,C,D 解答を投票する
Firewall update signature database and Virus database online through security service center, requires the firewall can connect to the Internet first, and then need to configure the correct DNS addresses.

As shown in the figure, a NAT server application scenario is configured when the web configuration mode is used.

Which of the following statements are correct? (Multiple choice)

Which types of encryption technology can be divided into? (Multiple Choice)

On Huawei USG series devices, the administrator wants to erase the configuration file. Which of the following commands is correct?

In the USG series firewall system view, the device configuration will be restored to the default configuration after the reset saved-configuration command is executed. No other operations are required.

Which of the following protocols can guarantee the confidentiality of data transmission? (Multiple Choice)

Which of the following guarantees "should detect and protect spam at critical network nodes and maintain upgrades and updates of the spam protection mechanism" in security 2.0?

In the digital signature process, which of the following is the HASH algorithm to verify the integrity of the data transmission?

Which of the following behaviors is relatively safer when connecting to Wi-Fi in public places?

After the firewall uses the hrp standby config enable command to enable the standby device configuration function, all the information that can be backed up can be directly configured on the standby device, and the configuration on the standby device can be synchronized to the active device.