لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Wildcard mask and subnet mask formats are similar, but values have different meanings, in wildcard mask, 1 indicates that the corresponding IP address bits need to compare, 0 indicates that the corresponding IP address bits to ignore comparisons.
A. TRUEcorrect
B. FALSEcorrect
عرض الإجابة
اجابة صحيحة: AB
السؤال #2
Which of the following is not an encryption algorithm in a VPN?
A. AThe RIP
B. BAES
C. C3DES
D. DDES
عرض الإجابة
اجابة صحيحة: A
السؤال #3
When configuring a security policy, a security policy can reference the address set or configure multiple destination IP addresses.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #4
In the GRE configuration environment, under the Tunnel interface mode, Destination address generally refers to:
A. the Tunnel interface IP addresscorrect
B. home terminal outer net export IP address
C. opposite terminal outer net Interface IP addresscorrect
D. the Tunnel interface IP address
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
When configuring NAT Server on the USG series firewall, the server-map table will be generated. Which of the following does not belong in the table?
A. Destination IP
B. Destination port number
C. Agreement number
D. Source IPcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Data Analysis Technology is to find, match keywords or key phrases, and analyze the correlation of time in data streams or information streams that have been obtained. Which of the following does not belong to evidence analysis technology?
A. Password decipherment, data decryption technology
B. File Digital Summary Analysis Technology
C. Exploring the technology of the connection between different evidence
D. Spam tracking technologycorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #7
About AH and ESP security protocols, which of the following statements are correct? (Multiple Choice)
A. AH can provide the functions of encryption and verificationcorrect
B. ESP can provide the functions of encryption and verificationcorrect
C. AH's protocol number is 51correct
D. ESP's protocol number is 51
عرض الإجابة
اجابة صحيحة: ABC
السؤال #8
Which of the following isP2DRThe core part of the model?
A. PolicyStrategy
B. Protectionprotection
C. Detectiondetect
D. Responseresponse
عرض الإجابة
اجابة صحيحة: A
السؤال #9
At what layer does packet filtering technology in the firewall filter packets?
A. Transport layer
B. Network layer
C. Physical layer
D. Data link layer
عرض الإجابة
اجابة صحيحة: B
السؤال #10
In addition to supporting built-in Portal authentication, firewall also supports custom Portal authentication, and does not require separate deployment of external Portal servers when using custom Portal authentication.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #11
ASPF technology enables the firewall to support multi-channel protocols such as FTP, at the same time can also formulate the corresponding security strategy for complex applications.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following types of encryption technology can be divided into? (multiple choice)
A. Symmetric encryption
B. Symmetric encryption
C. fingerprint encryption
D. data encryption
عرض الإجابة
اجابة صحيحة: AB
السؤال #13
Which attack below does not belong to a special packet attack?
A. ICMP redirection packet attack
B. ICMP unreachable packet attack
C. IP address scan attackcorrect
D. Super ICMP Packet Attack
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Regarding the characteristics of the routing table, which of the following items is described correctly
A. Port When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric
B. Port In the global routing table, there is at most one next hop to the same destination CIDR block
C. There may be multiple next hops in the global routing table to the same destination
D. Port When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask
عرض الإجابة
اجابة صحيحة: ACD
السؤال #15
Which of the following is the correct description of windows log event type? (Multiple Choice)
A. A warning event is a successful operation event of an application, driver, or service
B. Error events usually refer to the loss of function and data
C. When the disk space is insufficient, it will be recorded as an "information event"correct
D. Failure audit event refers to a failed audit security login attempt, such as a failure when the user view accesses the network drive is logged as a failed audit event
عرض الإجابة
اجابة صحيحة: BCD
السؤال #16
The following features which option does not belong to AH can realize?
A. resistance to prevent replaycorrect
B. data authentication
C. the confidentialitycorrect
D. data integrity test
عرض الإجابة
اجابة صحيحة: AC
السؤال #17
Which of the following types of attacks does the DDoS attack belong to?
A. Snooping scanning attack
B. Malformed packet attack
C. Special message attack
D. Traffic attackcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #18
When the firewall hard disk is on the throne, which of the following statement about the firewall log is correct?
A. Administrators can announce the content log to view the detection and defense record of network threats
B. Administrators can understand the user's security risk behavior and the cause of the alarm or blocking reason via threat logs
C. Administrators know the user's behavior, the keyword of the exploitation, and the effectiveness of the audit policy configuration through user activity logs
D. Administrators can use the security policy in which traffic hits in the policy, for fault location when there is a problem
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Caesar Code is primarily used to encrypt data by using a stick of a specific specification.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Regarding the description of the Windows log event type, which of the following is correct? (Multiple Choice)
A. Warning event refers to an event that the application, driver or service is successful
B. Error events usually refer to the loss of functionality and data
C. When the disk space is insufficient, it will be recorded as a "information event"
D. Failure audit event refers to a failure of security login attempts, such as failure when a user view accesses a network drive, is recorded as a failure audit event
عرض الإجابة
اجابة صحيحة: ABD
السؤال #21
Which of the following is a remote authentication method? (Multiple Choice)
A. RADIUScorrect
B. Local
C. HWTACACScorrect
D. LLDP
عرض الإجابة
اجابة صحيحة: AC
السؤال #22
The following description of the contents of the each stage of the SSL handshake protocol, which is wrong?
A. the client sends client_Hello message, the server response Server_Hello newscorrect
B. the server sends Server_Hello and then wait for the client sends the messagecorrect
C. after the client receives a series of messages sent by the server and digest, send Client Key Exchange message to the server
D. the client and the server send ChangeCipherSpec and finished messages to each other
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information flow, and analyze the correlation of time. Which of the following is not an evidence analysis technique?
A. Password deciphering, data decryption technology
B. Document Digital Abstract Analysis Technology
C. Techniques for discovering the connections between different evidences
D. Spam tracking technologycorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Which of the following options arePKIentity orientationCAHow to apply for a local certificate? (multiple choice)
A. Asymmetric encryption algorithm
B. Stream Encryption Algorithm
C. hash algorithm
D. Symmetric encryption algorithm
عرض الإجابة
اجابة صحيحة: AD
السؤال #25
"Be good at observation" and "keep suspicion" can help us better identify security threats in the online world.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #26
The process of electronic forensics includes: protecting the site, obtaining evidence, preserving evidence, identifying evidence, analyzing evidence, tracking and presenting evidence.
A. False
B. True
عرض الإجابة
اجابة صحيحة: B
السؤال #27
In tunnel encapsulation mode, there is no need to have the routing to the destination private network segment, because the data will reseal using the new IP header to find routing table.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #28
As shown, when configuring the point-to-multipoint scenarios, the headquarters network segment is 10.1.1.0/24, the segment of branch 1 is 10.1.2.0/24, of branch 2 is 10.1.3.0/24. About the protected data flow configuration which defined by headquarters and branch offices, which of the following combinations can be the full matched requirements?
A. 2
B. 2 3 5
C. 2 4 6
D. 4 5 6
عرض الإجابة
اجابة صحيحة: B
السؤال #29
Web redirection password authentication function, only the user for the purpose of the port is 80 HTTP business visit, the system only support the "Redirect" to the authentication page for session authentication.
A. TRUEcorrect
B. FALSEcorrect
عرض الإجابة
اجابة صحيحة: AB
السؤال #30
Which of the following are the key features of the state inspection firewall include?
A. he processing speed is slow
B. ollow-up packet processing performance is excellent
C. an only detect network layer
D. o the packet filtering detection to each packet
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: