When using the ______ function of SSL VPN, the virtual gateway will assign an intranet IP address to the access user, which is used for the access user to access the P resources of the intranet[fill in the blank]*
in the administratorUSGWhich of the following operations are required during the firewall software version upgrade? (multiple choice)
The reason why NAPT can realize one-to-many address translation is that the ______ is also translated when the address is translated, so multiple private addresses can share the same public address.[fill in the blank]*
IPThe protocol in the header (protocol) field identifies the protocol used by its upper layer. Which of the following field values indicates that the upper layer protocol isUDPprotocol?
When the company's network administrator is performing dual-system hot backup, due to the possibility of inconsistent round-trip paths, if he wants to enable the session fast backup function, the command that needs to be entered is ______[fill in the blank]*
which of the followingIPSec VPNnecessary configuration? (multiple choice)
What is the corresponding warning level for major network security incidents?
Which of the following descriptions about dual-system hot backup is wrong? ( )[Multiple choice]*
The firewall imports users locally, and supports importing user information from _____ format files and database dbm files to the local device.[fill in the blank]*
Which of the following statements about electronic evidence sources is false?
Single sign-on function for Internet users, users directlyADServer authentication, the device does not interfere with the user authentication process,ADMonitoring services need to be deployed inUSGequipment, monitoringADAuthentication information of the server
Business Impact Analysis (BIA) does not include which of the following?
Admin wants to createwebconfiguration administrator, devicewebaccess port number20000, and the administrator is at the administrator level, which of the following commands is correct?
Please sort from large to small according to the table processing priority of iptables.[fill in the blank]*
The attacker searches the ports currently open by the attacked object by scanning the ports to determine the attack mode. In port scanning attacks, attackers usually use Port Scan attack software to initiate a series of TCP/UDP connections, and determine whether the host uses these ports to provide services according to the response packets. Such network probing is called _____ scanning.[fill in the blank]*
Which of the following options is correct regarding the actions of the security policy and the description of the security profile? (multiple choice)
A company's employee account has expired, but the account can still be used to access the company's server. Which security risks do the above scenarios belong to? (multiple choice)
IPv6 supports configuring router authorization function on the device, verifying peer identity through digital certificate, and selecting legal device. ( )[Multiple choice]*
Encryption technology can convert readable information into unreadable information through certain methods.
at HuaweiSDSecIn the solution, which of the following is an analysis layer device?
Which of the following options isL2TPThe port number used by the packet?
In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)
In which of the following scenarios does the firewall generate the Server map table? ( )
In symmetric encryption algorithms, the ________ algorithm is used over a data communication channel, browser or network link.[fill in the blank]*
After a network intrusion event occurs, the identity of the intrusion, the source of the attack and other information are obtained according to the plan, and the intrusion behavior is blocked. The above actions belong to PDRR. What are the links in the network security model? (multiple choice)
The digital certificate fairs the public key through a third-party organization, thereby ensuring the non-repudiation of data transmission. Therefore, to confirm the correctness of the public key, only the certificate of the communicating party is required.
Which of the following are functions of address translation technology?(multiple choice)
TCSECWhich of the following protection levels are included in the standard? (multiple choice)
existL2TPconfiguration, for the commandTunnel Name, which of the following statements is true? (multiple choice)
Which of the following is true about the firewall log when the firewall hard drive is in place?
"Caesar Cipher"Data is mainly encrypted by using a specific specification of stick.
SIPprotocol usageSDPmessage to establish a session,SDPThe message contains a remote address or a multicast address
Which of the following are remote authentication methods? (multiple choice)
Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)
Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission
firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?
firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?
Regarding the description of vulnerability scanning, which of the following is false?
Which of the following is not a key technology of antivirus software?
Which of the following options is correct regarding the description of firewall hot standby? (multiple choice)
VGMPIn which of the following situations occurs in the group, the group will not actively send the message to the peerVGMPmessage/
Which of the following options is not part of the quintuple range?
existUSGseries firewall, you can use. The function provides well-known application services for non-well-known ports.
Which of the following types of encryption technology can be divided into? (multiple choice)
existVRRP(Virtual Router Redundancy Protocol) group, the primary firewall regularly sends notification messages to the backup firewall, and the backup firewall is only responsible for monitoring notification messages and will not respond
Which of the following is true about the security policy configuration command?
For the process of forwarding session header packets between firewall domains, there are the following steps:
1, look up the routing table
2, find the inter-domain packet filtering rules
3, lookup session table
4, find the blacklist
Which of the following is in the correct order?
Which of the following options is not included in the survey respondents in the security assessment method?
Intrusion Prevention System (IPS) is a defense system that can block in real time when an intrusion is detected
For network security incidents that occur, remote emergency response is generally adopted first. If the problem cannot be solved for the customer through remote access, after confirmation by the customer, go to the local emergency response process
In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)
An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*
Because NAT technology can realize one-to-many address translation. So with NAT technology, there is no need to worry about insufficient IPv4 addresses.
Which of the following options are available for IPSec VPN peer authentication?
The TCP/IP protocol stack packet encapsulation includes: Which of the following describes the encapsulation order (sort order: ABDC)
According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
In which of the following scenarios does the firewall generate the Server-map table?
_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*
If we do not want to generate a reverse Server Mapi entry when configuring NAT Server, we need to add a parameter when configuring NATServerE. This parameter is ( ) (fill in the blank)
Which of the following attacks is not a cyber attack?
Which of the following statements about OSPF is correct?
Regarding NAT technology. Which of the following descriptions is false?
Which of the following does not belong to the block encryption algorithm in the symmetric encryption algorithm?
If foreign criminals use the Internet to steal my country's state secrets, what kind of early warning will the state initiate?
( ) Can block discovered network intrusions in real time. (fill in the blank)
Which of the following does not belong to the log format of the firewall? ( )[Multiple choice]
To configure a NAT policy in command line mode, you need to use the .command ( ) in the system view to enter the NAT policy configuration view. (all lowercase) (fill in the blank)
If the company network administrator needs to check the status of the heartbeat interface after configuring the company’s dual-system hot backup, the command he needs to type is ( ) The system view has been entered by default) (fill in the blank)
Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*
Which of the following descriptions of the firewall log is wrong?
The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*
Digital envelope technology means that the sender uses the receiver's public key to encrypt the data and then sends the ciphertext to the receiver.
The IDS is usually installed on the switch to detect intrusion, and at the same time, it can avoid the single point of failure affecting the normal operation of the network.