According to the number of users operating at the same time, the operating system can be divided into single-user operating system and multi-user operating system. Which of the following items is not a multi-user operating system?
Which of the following is network address port translation (NAPT) and only translate network addresses (No-PAT) difference?
In the VGMP group state, if the device's own VGMP group priority is equal to the peer device's VGMP group priority, the device's VGMP group state is ( ). (answer in letters) (fill in the blank)
Compared with IPSec VPN, ( ) has the advantage of good compatibility and can encapsulate IPX, multicast packets, etc., and is widely used. (fill in the blank)
How many IPSec SAs need to be established to encapsulate P packets using the AH+ESP protocol?
Which of the following descriptions about digital fingerprints in digital signatures is wrong? ( )[Multiple choice]*
Equipment sabotage attacks are generally not easy to cause information leakage, but usually cause interruption of network communication services.
When configuring user single sign-on, use the receivePCIn message mode, the authentication process has the following steps:
1. visitorPCExecute the login script and send the user login information toADmonitor
2. Firewall extracts user andIPAdd the correspondence to the online user table
3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall
4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?
Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*
whenUSGWhich of the following logs can be viewed when the series firewall hard disk is in place? (multiple choice)
After the firewall detects a virus, which of the following will release the virus?
The default authentication domain of the USG6000 series firewall is the _____ domain.[fill in the blank]*
After the firewall detects an intrusion, the administrator can view the intrusion log information in the firewall business log or ( ) log. (fill in the blank
The key used by DES encryption is bits, while the key used by 3DES encryption is bits.
The company administrator uses the ping command to test the connectivity of the network. If he needs to specify the source address of the ehco-request message, what are the additional parameters he needs?
Regarding the description of the firewall security zone and interface relationship, which of the following options is correct? (multiple choice)
Which of the following is not the default security zone of the firewall ( )[Multiple choice]*
Which of the following options is not included in the processing method adopted by the firewall for the matched authentication data flow?
Which of the following SSLVPN functions can and can only access all TCP resources?
In the authentication policy of the firewall, _____ allows the user to not need to enter the user name and password, but can obtain the corresponding relationship between the user and the IP, so as to carry out policy management based on the user[fill in the blank]*
Which of the following is an action to be taken during the eradication phase in a cybersecurity emergency response? (multiple choice)
When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*
Which of the following is not a stand-alone anti-virus technology? ( )[Multiple choice]*
B. Configure anti-virus technology on network firewall
C. Use virus detection tools
D. Patch the system
IPv6 supports configuring router authorization function on the device, verifying peer identity through digital certificate, and selecting legal device. ( )[Multiple choice]*
Please sort from large to small according to the table processing priority of iptables.[fill in the blank]*
In which of the following scenarios does the firewall generate the Server-map table?
Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3. Detection stage, 4. eradication phase[fill in the blank]*
Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*
In the classification of the information security level protection system, which of the following levels define that if the information system is destroyed, it will cause damage to social order and public interests? (multiple choice)
Which of the following options arePKIentity orientationCAHow to apply for a local certificate? (multiple choice)
existUSGOn the series firewall, configurewebAfter the redirection function is enabled, the authentication page cannot pop up. Which of the following is not the cause of the failure?
When the firewall upgrades the signature database and virus database online through the security service center, the firewall is required to be able to connect to the Internet first, and theDNSaddress
Because the server is a kind of computer, we can use our personal computer as a server in the enterprise.
Which of the following options are at risk from traffic-based attacks? (multiple choice)
Intrusion Prevention System (IPS) is a defense system that can block in real time when an intrusion is detected
Digital certificate technology solves the problem that the public key owner cannot be determined in digital signature technology
Which of the following options are included in the protection of data by encryption technology during data transmission? (multiple choice)
Which of the following options are the possible reasons for the problem that users cannot access network resources in the authentication-free two-way binding mode? (multiple choice)
About disconnectTCPIn the description of the connection four-way handshake, which of the following is false?
Which of the following types of encryption technology can be divided into? (multiple choice)
Security policy conditions can be divided into multiple fields, such as source address, destination address, source port, destination port, etc.
"and"That is to say, this policy is hit only if the information in the packet matches all fields.
Regarding the statement of firewall security policy, which of the following options is false?
Which of the following are the main implementations of gateway antivirus? (multiple choice)
Common information security standards and specifications mainly include the national level protection system (GB), _______, the American standard TCSEC and the European Union standard ITSEC.[fill in the blank]
at HuaweiSDSecIn the solution, which of the following options belong to the device of the executive layer? (multiple choice)
Which of the following options is correct for the description of a buffer overflow attack?
(multiple choice)
Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)
Which of the following descriptions about dual-system hot backup is wrong? ( )[Multiple choice]*
Which of the following is false for a description of an intrusion detection system?.
In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)
Digital signature technology obtains a digital signature by encrypting which of the following data?
Which of the following isUSGUser name for the first login of the series firewall/password?
Which of the following does not belong toUSGUser authentication method in firewall?
As shown in the figure, aNAT serverapplication scenarios, when usingwebWhen this configuration is performed in the configuration mode. Which of the following statements are correct? (multiple choice)
Which of the following options is correct regarding the matching conditions of a security policy? (multiple choice)
When dual-system hot backup is deployed on the firewall,VRRPWhich of the following protocols should be used to switch the overall status of a backup group?
Please match the following information security risks to information security incidents one by one.[fill in the blank]*
physical security riskEnterprise server permissions are loosely set
Information Security Management RiskInfected Panda Burning Incense
Information Access RiskFire destroyed equipment in computer room
application riskTalk to people about leaking company secrets
Which of the following statements are true about single sign-on? (multiple choice)
Regarding the description of vulnerability scanning, which of the following is false?
In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)
HCIA-Security | H12-711_V3.0 Questions Answers | H12-711_V3.0 Test Prep | HCIA-Security V3.0 Questions PDF | H12-711_V3.0 Online Exam | H12-711_V3.0 Practice Test | H12-711_V3.0 PDF | H12-711_V3.0 Test Questions | H12-711_V3.0 Study Material | H12-711_V3.0 Exam Preparation | H12-711_V3.0 Valid Dumps | H12-711_V3.0 Real Questions | HCIA-Security H12-711_V3.0 Exam Questions