The following describes how the intrusion prevention signature database is upgraded Which is wrong which n single selection)
End devices and users must authenticate and authorize before they can access the post-authentication domain.
The following is a description of the trapping technique The correct ones are which women's multiple choices).
A description of the following IPv6 Secure Neighbor Discovery feature information for one of the interfaces Which one is wrong?
What are the common database intrusion detection techniques? (Multiple selection)
Broiler chickens Also known as a zombie, it usually refers to a machine that can be controlled remotely by hackers and is often used in DDOS attacks.
Take the following description of safety measures Which one is wrong? (single selection).
What are the logical/technical access controls in the following equation? (multiple selection).
Huawei's network security intelligence system CIS can only be linked with which of the following devices to block viruses?
Which of the following is wrong about Huawei's approach to business security resilience? (single selection).
The significance of information security standards is to provide an overall level of security Optimize security resource allocation (single selection).
In the Anh-DDos system What are the functions that ATIC can complete as a management center? (multiple selection).
The following describes the role of logs Which one is wrong? (single selection).
Which of the following items is not part of the firewall dual-machine hot standby ES-induced check is small
A VPCA and VPCB are created under a virtual data center VDC, and host A (192.168.1.100/24) is applied for in the VPCA Filed Host B (1921682100/24). Now configure VPC access Create a virtual firewall security policy as follows:
Security-policy
Source-zone any
destination-zone any
source-address 192.168.2.100 32
destination-address 192.168.1.100 32
action permit
Which of the following statements is correct?
In the enterprise network, the source IP address and the destination IP address need to be translated at the same time, and there is no fixed mapping relationship before and after the destination IP address translation The following USC firewall features which combined can buy cash out less demand
Which of the following options is not included in the data theft phase of HiSec Insight?
A Ping Tunnel detection
B. DNS Turnel detection
C. Traffic base anomaly detection
D. Web anomaly detection
In the following description of the principles of network trapping defense, which are correct? (multiple selection).
Due to the presence of a large number of decoys in the network Attackers will be caught up in an online world where the real is indistinguishable. Attackers often need to spend a lot of time to distinguish the authenticity of information, thereby delaying the attacker's network attack, giving defenders more response time, and reducing the possibility of attackers attacking real systems.
On the principle of defense against trapping Which of the following is described as incorrect=
With the following description of network scanning defense technology, which is correct? (single selection).
in the architecture of software-defined security Which of the following feature descriptions is correct?
One of the reasons why traditional passive defense does not protect against APT attacks is that traditional defense methods cannot correlate and analyze threats.
In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion data records being compromised. Organizations must follow the principle of which of the following options to keep data safe at all times.
The guarantee of information security does not need to be fully integrated with business implementation, because information security will increase the complexity of the network and reduce the efficiency of business processing. (single selection).
Which of the following options does not reflect the advanced characteristics of APT attacks? (single selection).
The purpose of access control is to provide access to authorized subjects and prevent any unauthorized and intentional access.
The following describes the implementation of server IP address planning in the firewall server load balancing function, which are the correct items? (multiple selection).
The main role of the audit system is to audit security events after the fact To provide sufficient evidence, a security audit product must have which of the following features7
Data storage security is part of the customer's overall security program It is also an important part of data center security and organizational security. Which of the following options is important to keep your data storage secure?
Domain name information collection is the first step in technical means information collection Domain name information can be collected through a domain name lookup website such as hois (single selection).
Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.
If the database O&M workload is much greater than the host O&M workload, you can choose to have an independent department outside the original O&M bastion host
The database bastion host.
In Huawei's user management solution, which of the following descriptions of authentication triggers are correct? (multiple selection).
Hypothetical has a set of raw data as follows: ・10, 20. 30. 40, 50" The set of data was desensitized by randomly swapping the position of the data, and the desensitized data was: ・30 20. 50. 10. 40\Which of the following algorithms is used in this data masking method? (single selection).