لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which protocols below can guarantee the confidentiality of data transmission? (Multiple Choice)
A. Telnetcorrect
B. SSHcorrect
C. FTP
D. HTTPScorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #2
Regarding the AH and ESP security protocols, which of the following options is correct? (Multiple Choice)
A. AH can provide encryption and verification functions
B. ESP can provide encryption and verification functionscorrect
C. The agreement number of AH is 51
D. The agreement number of ESP is 51
عرض الإجابة
اجابة صحيحة: BC
السؤال #3
Which of the following descriptions of single sign-on is correct?
A. The visitor recited the Portal authentication page and sent the username and password to FT to identify his/her identity, and the password was not stored on the FT, and the FI sent the username and password to the third-party authentication server, and the authentication process was carried out on the authentication server
B. The visitor sends the username and password that identifies his identity to the third-party authentication server, and after the authentication is passed, the third-party authentication server sends the visitor's identity information to Fcorrect
C. F7 only records the identity information of the visitor and does not participate in the authentication process
D. Visitors obtain the SMS verification code through the Portal authentication page, and then enter the SMS verification code to pass the authentication
E. The visitor sends the username and password that identifies them to the FW through the portal authentication page, on which the password is stored and the verification process takes place on the F
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Execute the command on the Firewall and display the above information. Which of the following description is correct? (Choose two.)
A. his Firewall VGMP group status is Active
B. he virtual IP address of the firewall G1/0/1 interface is 202
C. he priority of the VRRP backup group of the firewall VRID 1 is 100
D. f the master device fails, it will not switch
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
Which of the following attacks is not a malformed message attack?
A. Teardrop attack
B. Smurf attack
C. TCP fragment attack
D. ICMP unreachable packet attackcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which of the following attacks does not belong to special packet attack?
A. ICMP redirect packet attack
B. ICMP unreachable packet attack
C. IP address scanning attackcorrect
D. Large ICMP packet attack
عرض الإجابة
اجابة صحيحة: C
السؤال #7
In some scenarios, it is necessary to convert the source IP address, but also convert the destination IP address, which technology of the following is used by these scenarios?
A. Two-way NATcorrect
B. Source Nat
C. NAT-Server
D. Nat Alg
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)
A. session table
B. ServerMapentry
C. Dynamic blacklist
D. routing table
عرض الإجابة
اجابة صحيحة: ABC
السؤال #9
NAPT technology can implement a public network IP address for multiple private network hosts.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #10
"Implementing security monitoring management for information and information systems, preventing illegal use of information and information systems", is to achieve which feature in information security?
A. Confidentiality
B. Controllabilitycorrect
C. Non-repudiation
D. Integrity
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which of the following is an action to be taken during the summary phase of the cybersecurity emergency response? (Multiple Choice)
A. Evaluation of members of the emergency response organization
B. Establish a defense system and specify control measures
C. Evaluate the implementation of the contingency plan and propose a follow-up improvement plan
D. Determine the effectiveness of the isolation measures
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
Which of the following isP2DRThe core part of the model?
A. PolicyStrategy
B. Protectionprotection
C. Detectiondetect
D. Responseresponse
عرض الإجابة
اجابة صحيحة: A
السؤال #13
When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*
A. AESP Header
B. BTCP Header
C. CRaw IP Header
D. DESP Tail
عرض الإجابة
اجابة صحيحة: A
السؤال #14
In USG series firewall, use non-well-known port provides well-known application service, can adopt the following techniques:
A. port mappingcorrect
B. the MAC and IP address binding
C. packet filter
D. long connection
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which options can be operated in the advanced settings of the Windows Firewall? (Multiple Choice)
A. Restore defaultcorrect
B. Change Notification Rules
C. Set connection safety rulescorrect
D. Set inbound and outbound rulescorrect
عرض الإجابة
اجابة صحيحة: ACD
السؤال #16
The following description of the intrusion fire protection system IPS, which is correct?
A. The port IPS can be concatenated at the network boundary
B. The IPS cannot prevent intrusion from occurring in real time
C. The port IPS can be attached to the switch and port mirrored through the switch
D. Oral IPS has the ability to customize intrusion prevention rules
عرض الإجابة
اجابة صحيحة: ACD
السؤال #17
Which of the Policy Center functional areas is wrong?
A. re-authentication domain refers to the client through the identity authentication before access to the area
B. ost-authentication domain refers to the client can access through the security certification area
C. solation domain refers to the client after authenticated must have access to the area
D. solation domain refers to the client security authentication failed the required access area
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which of the following is non-symmetric encryption algorithm?
A. RC4correct
B. 3DES
C. AES
D. DHcorrect
عرض الإجابة
اجابة صحيحة: AD
السؤال #19
About SSL VPN technology, which of the following statement is wrong?
A. SSL VPN technology is perfect for NAT traversal scenarios
B. Encryption of SSL VPN technology only takes effect on the application layer
C. SSL VPN requires dial clientcorrect
D. SSL VPN technology expands the network range of enterprises
عرض الإجابة
اجابة صحيحة: C
السؤال #20
NAPT technology can implement a public IP address for multiple private network hosts.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #21
What protection levels are included in TCSEC standard? (Multiple Choice)
A. Verification Protectioncorrect
B. Forced Protectioncorrect
C. Self-protectioncorrect
D. Passive Protection
عرض الإجابة
اجابة صحيحة: ABC
السؤال #22
Which of the following types of encryption technology can be divided into? (multiple choice)
A. Symmetric encryption
B. Symmetric encryption
C. fingerprint encryption
D. data encryption
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
A Web server is deployed in an enterprise intranet to provide Web access services to Internet users, and in order to protect the access security of the server, it should be divided into the _____ area of the firewall.
A. DMZ
B. DMY
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which types of encryption technology can be divided into? (Multiple Choice)
A. Symmetric encryptioncorrect
B. Asymmetric encryptioncorrect
C. Fingerprint encryption
D. Data encryption
عرض الإجابة
اجابة صحيحة: AB
السؤال #25
Which of the following is the encryption technology used by digital envelopes?
A. Symmetric encryption algorithm
B. Asymmetric encryption algorithmcorrect
C. Hash algorithm
D. Stream encryption algorithm
عرض الإجابة
اجابة صحيحة: B
السؤال #26
Regarding the characteristics of the routing table, which of the following items is described correctly
A. APort When a packet matches multiple entries in the routing table, it is forwarded based on the route entry with the largest metric
B. BPort In the global routing table, there is at most one next hop to the same destination CIDR block
C. CThere may be multiple next hops in the global routing table to the same destination
D. DPort When a packet matches multiple entries in the routing table, it is forwarded according to the longest mask
عرض الإجابة
اجابة صحيحة: CD
السؤال #27
Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.
A. TRUE
B. FALSEcorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Firewall Gateway Anti-Virus Response includes alerting and blocking, the way in which the alarm device only generates a log, sent out without processing on HTTP protocol to transmit the document: blocking the way equipment is disconnected from the HTTP server and block files, push Web pages to the client and generates logs.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #29
UDPA port scan is when an attacker sends a zero byte lengthUDPmessage to a specific port of the target host, if the port is open, it will return aICMPPort reachable data packets.
A. Update virus database in real time
B. Shelling technology
C. format the disk
D. self protection
عرض الإجابة
اجابة صحيحة: A
السؤال #30
What are common hash algorithms? (Choose two.)
A. ES
B. ES
C. D5
D. HA-1
عرض الإجابة
اجابة صحيحة: CD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: