لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is the numbering range of Layer 2 ACLs?
A. The 3000~3999correct
B. The 4000~4999
C. The 1000~1999
D. @2000~2999
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Because NAT technology can realize one-to-many address translation. So with NAT technology, there is no need to worry about insufficient IPv4 addresses.
A. False
B. True
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Data monitoring can be divided into two types: active analysis and passive acquisition.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #4
"observant"and"remain skeptical"Can help us better identify security threats in the online world
A. False
B. True
عرض الإجابة
اجابة صحيحة: B
السؤال #5
After the network attack event occurs, set the isolation area, summary data, and estimated loss according to the plan. Which stage does the above actions belong to the work contents of in the network security emergency response?
A. Preparation stage
B. Detection phase
C. Recovery phase
D. Inhibition phase
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Evidence identification needs to resolve the integrity verification of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the standard of evidence identification?
A. Relevance criterion means that if the electronic evidence can have a substantial impact on the facts of the case to a certain extent, the court should determine that it is relevant
B. Objective standard means that the acquisition, storage, and submission of electronic evidence should be legal, and the basic rights such as national interests, social welfare, and personal privacy are not strictly violated
C. Legality standard is to ensure that the electronic evidence is collected from the initial collection, and there is no change in the content of the evidence submitted as evidence
D. Fairness standard refers to the evidence obtained by the legal subject through legal means, which has the evidence ability
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Typical remote authentication mode are :( multiple choice)
A. RADIUScorrect
B. Local
C. HWTACACScorrect
D. LLDP
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
Regarding the firewall security strategy, which of the following is wrong?
A. If the security policy is Permit, the discarded message will not be accumulated "hitting"
B. When configuring the security policy name, you cannot reuse the same name
C. Adjust the order of the security policy, do not need to save the configuration file, take effect immediately
D. Huawei USG series firewall security strategy entry cannot exceed 128correct
عرض الإجابة
اجابة صحيحة: D
السؤال #9
HRP (Huawei Redundancy Protocol) Protocol to back up the connection state of data include: (Multiple Choice)
A. TCP/UDP sessions tablecorrect
B. Server Map tablecorrect
C. the dynamic blacklistcorrect
D. the routing table
عرض الإجابة
اجابة صحيحة: ABC
السؤال #10
Which item is correct about SSL VPN?
A. Can be used without the clientcorrect
B. Can encrypt the IP layer
C. There is a NAT crossing problem
D. No authentication
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following statement is wrong about the L2TP VPN of Client-Initialized?
A. After the remote user access the Internet, the L2TP tunnel connection request can be initiated directly from the remote LNS through the client software
B. The LNS device receives the user's L2TP connection request, and the user can be verified according to the username and password
C. LNS assign private IP addresses for remote users
D. The remote users do not need to install VPN client softwarecorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #12
As shown, in transmission mode, which of the following locations should the AH header be inserted in?
A. A3
B. B2
C. C1
D. D4
عرض الإجابة
اجابة صحيحة: B
السؤال #13
"Caesar Password" is mainly encrypted by using a stick of specific specifications.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which of the following can be supported by Policy Center access control? (Choose three.)
A. Hardware SACG (hardware security access control gateway)
B. 802
C. ARP control
D. Software SACG (host firewall)
عرض الإجابة
اجابة صحيحة: ABD
السؤال #15
Which of the following is not a quintuple range?
A. Source IP
B. Source Maccorrect
C. Destination IP
D. Destination port
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Compared with the software architecture of C/S, B/S does not need to install a browser, and users are more flexible and convenient to use.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #17
In the Client-Initiated VPN configuration, it is generally recommended to plan the address pool and headquarters network address as different network segments, otherwise you need to turn on the proxy forwarding function on the gateway device.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Regarding the firewall security policy, which of the following options is wrong?
A. Adjust the order of security policies with immediate effect, no need to save the configuration file
B. When configuring the security policy name, you cannot reuse the same name
C. If the security policy is permit, the discarded message will not accumulate the number of hits
D. Huawei's USG series firewalls cannot have more than 128 security policy entries
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Intrusion prevention system technical characteristics include (multiple choice)
A. online modecorrect
B. real-time blockingcorrect
C. self learning and adaptivecorrect
D. straight road deployment
عرض الإجابة
اجابة صحيحة: ABC
السؤال #20
In IPSEC VPN, which of the following scenarios can be applied by tunnel mode?
A. etween the host and the host
B. etween hosts and security gateways
C. etween security gateways
D. etween tunnel mode and transport mode
عرض الإجابة
اجابة صحيحة: C
السؤال #21
Typical remote authentication modes are: (Multiple Choice)
A. RADIUScorrect
B. Local
C. HWTACACScorrect
D. LLDP
عرض الإجابة
اجابة صحيحة: AC
السؤال #22
IPSec VPN technology does not support NAT crossing when using the ESP security protocol package, because ESP encrypts the header of the packet.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #23
Which of the following statements is wrong about the firewall gateway's anti-virus response to the HTTP protocol?
A. Blocking means that the device disconnects from the HTTP server and blocks file transfer
B. Alarm mode device only generates logs and sends them out without processing the files transmitted by the HTTP protocol
C. When the gateway device blocks the HTTP connection, push the web page to the client and generate a log
D. Response methods include announcement and blocking
عرض الإجابة
اجابة صحيحة: D
السؤال #24
The simplest certificate contains a public key, name and certificate authority ()
A. False
B. True
عرض الإجابة
اجابة صحيحة: D
السؤال #25
About the description of the Windows firewall, which of the following statements are correct? (Multiple Choice)
A. Windows firewalls can only allow or prohibit preset programs or features and programs installed on the system, and cannot customize the release rules in accordance with protocols or port numbers
B. Windows firewall not only allows or prohibits preset programs or features and programs installed on the system, but also support to customize the release rules in accordance with protocols or port numbers
C. If in the process of setting up the Windows firewall, the Internet cannot be accessed, you can quickly restore the firewall to the initial state using the restored default value function
D. Windows firewall can change the notification rule in the closed state
عرض الإجابة
اجابة صحيحة: ABC
السؤال #26
When A and B communicate with each other for data communication, if an asymmetric encryption algorithm is used for encryption, when A sends data to B, which of the following keys will be used to encrypt the data?
A. A's private key
B. B's public key
C. A's public key
D. B's private key
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Which of the following is the status information that can be backed up by the HRP (Huawei Redundancy Protocol) protocol? (Multiple Choice)
A. Conference tablecorrect
B. ServerMap entrycorrect
C. Dynamic blacklistcorrect
D. Routing table
عرض الإجابة
اجابة صحيحة: ABC
السؤال #28
SVN products extend the network function, the need to implement the user can only access the remote enterprise Intranet, cannot access to the local LAN and the Internet, you need to use the client routing is:
A. Full Tunnelcorrect
B. Split Tunnel
C. Route Tunnel
D. Manual Tunnel
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Regarding the relationship and role of VRRP/VGMP/HRP, which of the following statements are correct? (Multiple choice)
A. VGMP group in the active state may include the VRRP group in the standby state
B. VRRP is responsible for sending free ARP to direct traffic to the new primary device during active/standby switchover
C. VGMP is responsible for monitoring equipment failures and controlling fast switching of equipment
D. HRP is responsible for data backup during hot standby operation
عرض الإجابة
اجابة صحيحة: BCD
السؤال #30
The following description of asymmetric encryption algorithms, which item is wrong?
A. Compared with symmetric encryption algorithms, the security factor is higher
B. Encryption is faster than symmetric encryption algorithms
C. Public keys are generally disclosed to users
D. Asymmetric encryption algorithms are a pair of keys, divided into public and private keys
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: