لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Admin wants to createwebconfiguration administrator, devicewebaccess port number20000, and the administrator is at the administrator level, which of the following commands is correct?
A.
B.
C.
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #2
What is the protocol number of the GRE protocol?
A. 47correct
B. 48
C. 46
D. The 50th
عرض الإجابة
اجابة صحيحة: A
السؤال #3
When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ()
A. Time synchronization servercorrect
B. FTP server (I)correct
C. DNS servercorrect
D. Mail servercorrect
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #4
The initial priority of the USG9500VGMP group is related to which of the following factors ()?
A. interface bandwidthcorrect
B. VRRP priority
C. Number of daughter cards on the interface boardcorrect
D. The number of CPUs on the D service boardcorrect
عرض الإجابة
اجابة صحيحة: ACD
السؤال #5
Which attack below is not a malformated packet attack?
A. TEARDROP attack
B. Smurf attack
C. TCP shard attack
D. ICMP unreachable message attackcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Under the USG series fire Trust region view configuration add interface GigabitEthernet0/0/1, GigabitEthernet0/0/1 no longer belongs to the Local area.
A. TRUEcorrect
B. FALSEcorrect
عرض الإجابة
اجابة صحيحة: AB
السؤال #7
In the Client-Initiated VPN configuration, generally it is recommended to plan the address pool and the headquarters of the network address for the different network segments, or need to open proxy forwarding on the gateway device.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Suitable traveler access to the corporate intranet VPN under way in the public network environment: (multiple choice)
A. GRE VPNcorrect
B. L2TP VPNcorrect
C. SSL VPNcorrect
D. L2TP over IPseccorrect
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #9
In the firewall, detect ftp command to set in which mode? (Choose two.)
A. ystem Model
B. nterface Mode
C. omain Model
D. nter-Domain mode
عرض الإجابة
اجابة صحيحة: CD
السؤال #10
Network administrators set up networking as follows: LAN_A --------- (G0/0) USG_A (G0/1) --------- (G0/0) USG_B (G0/1) -------------- LAN_B USG_A divides firewall security zones, connects LAN_A areas Trust, connects USG_B area's Untrust, according to the above description, which of the following statement is correct?
A. USG_B G0/0 must join Untrust zone
B. USG_B G0/0 must join the Trust zone
C. USG_B G0/1 must join the Trust zone
D. USG_B G0/0 can join any regional
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which of the following is the core part of the P2DR model?
A. Policy Strategycorrect
B. Protection
C. Detection
D. Response
عرض الإجابة
اجابة صحيحة: A
السؤال #12
The trigger authentication method for firewall access user authentication does not include which of the following? () [Multiple choice]
A. MPLS VPNcorrect
B. SSL VPN
C. IPSec VPN
D. L2TP VPN
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Among the various aspects of the risk assessment of IS027001, which of the following does not belong to the system design and release process?
A. Hold a summary meeting of the project in the information security management stagecorrect
B. Determine risk disposal measures and implement rectification plans
C. Determine risk tolerance and risk appetite
D. System integration and information security management system document preparation
عرض الإجابة
اجابة صحيحة: A
السؤال #14
In most scenarios, NAT Inbound is used to the enterprise private network users to access the Internet scenario.
A. rue
B. alse
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Regarding the online user management, which of the following is incorrect?
A. Each user group can include multiple users and user groups
B. Each user group can belong to multiple parent user groupscorrect
C. The system has a default user group by default, and it is also the system default authentication domain
D. Each user at least belongs to one user group, or it can belong to multiple user groups
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of the following SSLVPN functions can and can only access all TCP resources?
A. Apply offline
B. local application
C. online application
D. Online Application
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Take the initiative to attack the most important feature is to listen information, to obtain confidential information, while the data owner or legitimate user, this kind of activities can not know.
A. TRUEcorrect
B. FALSEcorrect
عرض الإجابة
اجابة صحيحة: AB
السؤال #18
DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Evidence identification needs to solve the integrity verification of evidence and determine if it meets the standards that can be used. Regarding the standards of evidence identification, which of the following statement is correct?
A. Relevance standard refers to that if the electronic evidence can have a material impact on the facts of the case to a certain extent, the court should rule that it is relevant
B. Objective standard refers to the acquisition, storage, and submission of electronic evidences shall be legal, and the basic rights such as national interests, social welfare and personal privacy do not constitute strict violations
C. Legality standard is to ensure that electronic evidence is collected from the initial acquisition, and the content is not changed in the process of submission as litigation evidence
D. Fair standard refers to that only the legal subject obtains the evidentiary material by legal means has evidentiary ability
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which of the following is the core part of the P2DR model?
A. Policycorrect
B. Protection
C. Detection
D. Response
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which of the following is not used by the Detection link in the P2DR model?
A. Real-time monitoring
B. Detection
C. Alarm
D. Close servicecorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #22
Which items are the encryption techniques used by digital envelopes? (Multiple Choice)
A. Symmetrical encryption algorithmcorrect
B. Asymmetric encryption algorithmcorrect
C. Hash algorithm
D. Flow encryption algorithm
عرض الإجابة
اجابة صحيحة: AB
السؤال #23
Which of the following addresses can be used for web management address of USG product? (Choose three.)
A. nterface Address
B. ub-interface address
C. lave IP address of the interface
D. UX interface address
عرض الإجابة
اجابة صحيحة: ABC
السؤال #24
The default policy on the firewall defaults to ( ) all traffic. (fill in the blank)
A. file sharing
B. web proxy
C. Port Forwarding
D. Network expansion
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Regarding SSL VPN technology, which of the following options is wrong?
A. SSL VPN technology can be perfectly applied to NAT traversal scenarios
B. SSL VPN technology encryption only takes effect on the application layer
C. SSL VPN requires a dial-up clientcorrect
D. SSL VPN technology extends the network scope of the enterprise
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Except built-in Portal authentication, firewall also supports custom Portal authentication, when using a custom Portal authentication, no need to deploy a separate external Portal server.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #27
About the description of the vulnerability scan, which of the following is wrong?
A. Vulnerability Scan is a technology based on network remote monitoring target network or host security performance vulnerability, which can be used to simulate attack experiments and security audits
B. Vulnerability scan is used to detect if the target host system has a vulnerability, generally a scan for a specific vulnerability for the target host
C. Vulnerability scan is a passive prevention measures to effectively avoid hacker attack behaviorcorrect
D. Vulnerability scan can be used according to the results of ping scanning and port scanning
عرض الإجابة
اجابة صحيحة: C
السؤال #28
As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?
A. The4correct
B. The3
C. The2
D. The1
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which of the following statement about the NAT is wrong?
A. AT technology can effectively hide the costs of the LAN; it is an effective network security protection technology
B. ddress Translation can follow the needs of users, providing FTP, WWW, Telnet and other services outside the LAN
C. ome application layer protocols carry IP address information in the data, but also modify the IP address information in the data of the upper layer when they are as NAT
D. or some non-TCP, UDP protocols (such as ICMP, PPTP), unable to do the NAT translation
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Which of the following does not belong to the network security threats?
A. storage media abusecorrect
B. leaked information assets
C. unauthorized access
D. Spywarecorrect
عرض الإجابة
اجابة صحيحة: AD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: