H12-711試験無料問題集「Huawei HCIA-Security V3.0 認定」

Which of the following is not part of a digital certificate?

The Protocol field in the IP header identifies the protocol used by the upper layer.
Which of the following field values indicates that the upper layer protocol is UDP protocol?

Which of the following are correct regarding the matching conditions of the security policy? (Multiple choice)

正解:A,B,C,D 解答を投票する
In the USG series firewall, which of the following commands can be used to query the NAT translation result?

When the following conditions occur in the VGMP group, the VGMP message will not be sent to the peer end actively?

Which of the following statements about IPSec SA is true?

On Huawei USG series devices, the administrator wants to erase the configuration file. Which of the following commands is correct?

The European TCSEC Code is divided into two modules, Function and Evaluation, which are mainly used in the military, government and commercial fields.

Which of the following description are correct about the security policy action and security configuration file? (Multiple Choice)

Which of the following is not included in the Corporate Impact Analysis (BIA)?

Which of the following attacks is not a malformed packet attack?

In the USG series firewall, you can use the ______ function to provide well-known application services for non-known ports.

Execute the command on the firewall and display the following information. which of the following description is correct? (Multiple Choice) HRP_A [USG_A] display vrrp interfaceGigabitEthernet 0/0/1 GigabitEthernet0/0/1 | Virtual Router 1 VRRP Group: Active state: Active Virtual IP: 202.38.10.1 Virtual MAC: 0000-5e00-0101 Primary IP: 202.38.10.2 PriorityRun: 100 PriorityConfig: 100 MasterPriority: 100 Preempt: YES Delay Time: 10

Some applications, such as Oracle database application, there is no data transfer for a long time, so that firewall session connection is interrupted, thus resulting in service interruption, which of the following technology can solve this problem?

After the firewall uses the hrp standby config enable command to enable the standby device configuration function, all the information that can be backed up can be directly configured on the standby device, and the configuration on the standby device can be synchronized to the active device.

If the company structure has undergone a practical change, it is necessary to retest whether the business continuity plan is feasible.

Security technology has different approaches at different technical levels and areas. Which of the following devices can be used for network layer security protection? (Multiple choice)

正解:A,B,C 解答を投票する
Digital signatures are used to generate digital fingerprints by using a hashing algorithm to ensure the integrity of data transmission.

Which of the following statement is wrong about NAT?