Exam4Training

Huawei H12-724-ENU HCIP-Security (Fast track) V1.0 Online Training

Question #1

Business accompanying is-A special access control method, according to the user’s access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

  • A . Wired access
  • B . Wireless access
  • C . VPN Access
  • D . 802.1X Access

Reveal Solution Hide Solution

Correct Answer: D
Question #2

Which of the following files can the sandbox detect? (multiple choice)

  • A . www file
  • B . PE file
  • C . Picture file
  • D . Mail

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #3

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

  • A . Common_ user Users can access Internet www H.
  • B . VIP Users can access Internet w H.
  • C . VIP Can visit Mail Server H.
  • D . Common user Users can access Mail_ Sever resource.

Reveal Solution Hide Solution

Correct Answer: B,C,D
Question #4

Identity authentication determines whether to allow access by identifying the identity of the access device or user.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #5

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

  • A . Enhanced mode refers to the authentication method using verification code.
  • B . Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
  • C . The enhanced mode is superior to the basic mode in terms of user experience.
  • D . Enhanced mode supports all HTTP Flood source authentication fields. "

Reveal Solution Hide Solution

Correct Answer: A,B
Question #5

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

  • A . Enhanced mode refers to the authentication method using verification code.
  • B . Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
  • C . The enhanced mode is superior to the basic mode in terms of user experience.
  • D . Enhanced mode supports all HTTP Flood source authentication fields. "

Reveal Solution Hide Solution

Correct Answer: A,B
Question #5

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

  • A . Enhanced mode refers to the authentication method using verification code.
  • B . Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
  • C . The enhanced mode is superior to the basic mode in terms of user experience.
  • D . Enhanced mode supports all HTTP Flood source authentication fields. "

Reveal Solution Hide Solution

Correct Answer: A,B
Question #5

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

  • A . Enhanced mode refers to the authentication method using verification code.
  • B . Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
  • C . The enhanced mode is superior to the basic mode in terms of user experience.
  • D . Enhanced mode supports all HTTP Flood source authentication fields. "

Reveal Solution Hide Solution

Correct Answer: A,B
Question #5

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

  • A . Enhanced mode refers to the authentication method using verification code.
  • B . Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
  • C . The enhanced mode is superior to the basic mode in terms of user experience.
  • D . Enhanced mode supports all HTTP Flood source authentication fields. "

Reveal Solution Hide Solution

Correct Answer: A,B
Question #10

Prosecution in the cloud sandbox

For the ordering of the process, which of the following options is correct?

  • A . 1-3-4-2
  • B . 1-4-2-3
  • C . 1-4-3-2
  • D . 3-1-4-2:

Reveal Solution Hide Solution

Correct Answer: C

Question #11

The following is the 802.1X access control switch configuration:

[S5720] dot1x authentication-method eap

[S5720-GigabitEthernet0/0/1] port link-type access

[S5720-GigabitEthemet0/0/1] port default vlan 11

[S5720-GigabitEthernet0/0/1] authentication dot1x

Assuming that GE0/0/1 is connected to user 1 and user 2 through the HUB, which of the following options is correct?

  • A . After user 1 is authenticated, user 2 can access network resources without authentication
  • B . User 1 and User 2 must be individually authenticated before they can access network resources
  • C . GE0/0/1 does not need to enable dot1X
  • D . Neither user 1 nor user 2 can pass the authentication and access network resources.

Reveal Solution Hide Solution

Correct Answer: A
Question #12

Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)

  • A . File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent Prevent employees from leaking company confidential documents to the Internet.
  • B . Content filtering can prevent the disclosure of confidential information and the transmission of illegal information
  • C . The application behavior control function can finely control common HTTP behaviors and FTP behaviors.
  • D . Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.

Reveal Solution Hide Solution

Correct Answer: A,B,C,D
Question #13

In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.

And development .

Which of the following key points should be done in "things"? (multiple choice)

  • A . Vulnerability intelligence
  • B . Defense in Depth
  • C . Offensive and defensive situation
  • D . Fight back against hackers

Reveal Solution Hide Solution

Correct Answer: B,D
Question #14

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Deployed by an enterprise network manager Agile Controller-Campus with SACG Later; Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)

  • A . A serious violation will prohibit access to the post-authentication domain.
  • B . The access control list of the post-authentication domain has not been delivered SACG.
  • C . ALC The number of rules issued is too many, and a lot of time is required to match, causing interruption of access services.
  • D . Agile Controller-Campus Wrong post-authentication domain resources are configured on the server.

Reveal Solution Hide Solution

Correct Answer: A,B,D
Question #16

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring .

Which of the following are its characteristics?

  • A . IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
  • B . It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
  • C . Unable to detect malicious operations or misoperations from internal killings.
  • D . Cannot do in-depth inspection

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which way can NAC Agent upgrade package be deployed?

  • A . By IP addresses
  • B . By terminal type
  • C . By account
  • D . By user information

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which way can NAC Agent upgrade package be deployed?

  • A . By IP addresses
  • B . By terminal type
  • C . By account
  • D . By user information

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which way can NAC Agent upgrade package be deployed?

  • A . By IP addresses
  • B . By terminal type
  • C . By account
  • D . By user information

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which way can NAC Agent upgrade package be deployed?

  • A . By IP addresses
  • B . By terminal type
  • C . By account
  • D . By user information

Reveal Solution Hide Solution

Correct Answer: A

Question #17

Which way can NAC Agent upgrade package be deployed?

  • A . By IP addresses
  • B . By terminal type
  • C . By account
  • D . By user information

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Which way can NAC Agent upgrade package be deployed?

  • A . By IP addresses
  • B . By terminal type
  • C . By account
  • D . By user information

Reveal Solution Hide Solution

Correct Answer: A
Question #23

Submit

  • A . 3->1->4->2->5
  • B . 3->2->4->1->5
  • C . 3->2->1->4->5
  • D . 3->1->2->4->5

Reveal Solution Hide Solution

Correct Answer: A
Question #24

Which of the following is the default port number of Portal authentication service?

  • A . 1812
  • B . 1813
  • C . 50200
  • D . 50300

Reveal Solution Hide Solution

Correct Answer: A,C
Question #25

Regarding WLAN, which of the following descriptions is correct?

  • A . WLAN Is to adopt 80211 Technical WiFi
  • B . WLAN There are two basic architectures: FAT AP with AC+FIT AP
  • C . AC+FATAP The architecture is suitable for medium and large use scenarios
  • D . AC+FITAP Autonomous network architecture

Reveal Solution Hide Solution

Correct Answer: B
Question #26

If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?

  • A . Generate logs and discard
  • B . Generate logs and forward them
  • C . Delete the content of the email attachment
  • D . Add announcement and generate log

Reveal Solution Hide Solution

Correct Answer: B
Question #27

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

  • A . Local upgrade
  • B . Manual upgrade
  • C . Online upgrade
  • D . Automatic upgrade

Reveal Solution Hide Solution

Correct Answer: A,C
Question #28

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

  • A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
  • B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
  • C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
  • D . If end users are scattered in different regions, a centralized deployment solution is recommended.

Reveal Solution Hide Solution

Correct Answer: A,C
Question #28

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

  • A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
  • B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
  • C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
  • D . If end users are scattered in different regions, a centralized deployment solution is recommended.

Reveal Solution Hide Solution

Correct Answer: A,C
Question #28

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

  • A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
  • B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
  • C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
  • D . If end users are scattered in different regions, a centralized deployment solution is recommended.

Reveal Solution Hide Solution

Correct Answer: A,C

Question #28

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

  • A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
  • B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
  • C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
  • D . If end users are scattered in different regions, a centralized deployment solution is recommended.

Reveal Solution Hide Solution

Correct Answer: A,C
Question #28

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

  • A . If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.
  • B . If most end users are concentrated on–Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.
  • C . If end users are scattered in different geographical locations, a distributed deployment solution is recommended.
  • D . If end users are scattered in different regions, a centralized deployment solution is recommended.

Reveal Solution Hide Solution

Correct Answer: A,C
Question #33

Remote control and penetration

Regarding the order of these four stages, which of the following options is correct?

  • A . 2-3-4-1
  • B . 1-2-4-3
  • C . 1-4-2-3
  • D . 2-1-4-3

Reveal Solution Hide Solution

Correct Answer: C
Question #34

Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.

What is the working mode of AP? (multiple choice)

  • A . access mode
  • B . Normal mode
  • C . Mixed mode
  • D . Monitoring mode

Reveal Solution Hide Solution

Correct Answer: B,D
Question #35

An enterprise adopts hardware SACG access method for admission control. The configuration commands are as follows, among which Key; Admin@123

[USG] right-manager server-group

[USG-rightm] localip 10.1.10.2

[USG-rightm]serverip 10. 1.31.78 shared-key AdnIn@123

[USG2100-rightm] right-manager server-group enable.

Assuming that the other configurations are correct, based on the above configuration only, which of the following options is correct?

  • A . After completing the configuration, SACG can successfully link with the Agile Controller-Campus.
  • B . After completing the configuration, SACG cannot successfully link with Agile Contrlle-Campus. P
  • C . Can issue pre-authentication domain ACL.
  • D . The linkage cannot be successful but the terminal can access the pre-authentication domain server.

Reveal Solution Hide Solution

Correct Answer: B
Question #36

802.1X During the authentication, if the authentication point is at the aggregation switch, in addition to RADIUS,AAA,802.1X.

In addition to the conventional configuration, what special configuration is needed?

  • A . Both the aggregation layer and the access layer switches need to be turned on 802.1X Function.
  • B . Access layer switch needs to be configured 802. 1X Transparent transmission of messages.
  • C . The aggregation switch needs to be configured 802 1X Transparent transmission of messages.
  • D . No special configuration required

Reveal Solution Hide Solution

Correct Answer: B
Question #37

If the user’s FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

  • A . Block
  • B . Declare
  • C . Alarm
  • D . Execution

Reveal Solution Hide Solution

Correct Answer: A,C
Question #38

Jailbroken mobile terminalMobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

  • A . Directly discard data sent by devices that do not comply with regulations
  • B . Certification of non-compliant equipment.
  • C . Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.
  • D . Send alarm information to notify the administrator to deal with it.

Reveal Solution Hide Solution

Correct Answer: C
Question #39

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

  • A . Discard message
  • B . URL Address redirected to Portal Authentication page
  • C . Direct travel
  • D . Send authentication information to authentication server

Reveal Solution Hide Solution

Correct Answer: B
Question #40

Sort all services according to user group and account: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.

Which of the following is correct regarding the order of priority?

  • A . account>user group>terminal IP Address range
  • B . By the end P Address range>account number>user group
  • C . account>Terminal protection address range>user group
  • D . user group>terminal P Address range>Account

Reveal Solution Hide Solution

Correct Answer: C

Question #41

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

  • A . Data analysis, data classification, post-processing
  • B . Data processing, data classification, post-processing
  • C . Data processing, attack classification, post-processing
  • D . Data processing, data classification, attack playback

Reveal Solution Hide Solution

Correct Answer: B
Question #42

Which of the following options will not pose a security threat to the network?

  • A . Hacking
  • B . Weak personal safety awareness
  • C . Open company confidential files
  • D . Failure to update the virus database in time

Reveal Solution Hide Solution

Correct Answer: C
Question #43

Which of the following options are relevant to Any Office The description of the solution content is correct? (Multiple choice)

  • A . Provide unified and secure access to enterprise mobile applications on mobile terminals.
  • B . The tunnel is dedicated and cannot be penetrated by viruses.
  • C . Applications are quickly integrated and can be extended.
  • D . It can be quickly integrated and docked with the enterprise application cloud platform.

Reveal Solution Hide Solution

Correct Answer: A,B,C,D
Question #44

Regarding the processing process of file overwhelming, which of the following statements is correct?

  • A . The file filtering module will compare the application type, file type, and transmission direction of the file identified by the previous module with the file filtering rules configured by the administrator.
    Then the lookup table performs matching from top to bottom.
  • B . If all the parameters of Wenzhu can match all file filtering rules, then the module will execute the action of this file filtering rule.
  • C . There are two types of actions: warning and blocking.
  • D . If the file type is a compressed file, then after the file filtering check, the female file will be sent to the file decompression module for decompression and decompression.
    Press out the original file. If the decompression fails, the file will not be re-filed.

Reveal Solution Hide Solution

Correct Answer: B
Question #45

Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?

  • A . File extension mismatch means that the file type is inconsistent with the file extension.
  • B . Unrecognized file type means that the file type cannot be recognized and there is no file extension.
  • C . File damage means that the file type cannot be identified because the file is damaged.
  • D . Unrecognized file type means that the file type cannot be recognized, and the file extension cannot be recognized.

Reveal Solution Hide Solution

Correct Answer: D
Question #46

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

  • A . MAC Certification
  • B . Password authentication
  • C . Not certified:
  • D . SN Certification

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D

Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #47

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

  • A . Address scanning
  • B . Buffer overflow p
  • C . Port scan
  • D . IP spoofing

Reveal Solution Hide Solution

Correct Answer: A,D
Question #56

The cleaned traffic is sent to the original destination server.

  • A . 1-3-4-2-5-6-7-8
  • B . 1-3-2-4-6-5-7-8
  • C . 1-3-4-2-6-5-8-7
  • D . 1-3-24-6-5-8-7

Reveal Solution Hide Solution

Correct Answer: C
Question #57

In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet .

Which of the following authentication methods can be used for access?

  • A . Local account authentication
  • B . Anonymous authentication
  • C . AD Account Verification
  • D . MAC Certification

Reveal Solution Hide Solution

Correct Answer: B
Question #58

Security zone division means to better protect the internal network security, Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area .

Which of the following options does not belong Agile Controller-Campus Security domain?

  • A . User domain
  • B . Network domain
  • C . Business domain:
  • D . Attack domain

Reveal Solution Hide Solution

Correct Answer: D
Question #59

Which of the following options belong to the keyword matching mode? (multiple choice)

  • A . Text
  • B . Regular expressions
  • C . Community word
  • D . Custom keywords

Reveal Solution Hide Solution

Correct Answer: A,B
Question #60

The realization of content security filtering technology requires the support of the content security combination license.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A

Question #61

About the software SACG And hardware SACG Description, which of the following is correct?

  • A . hardware SACG use Any Office Perform admission control.
  • B . software SACG use Any Office Perform admission control.
  • C . hardware SACG Than software SACG cut costs.
  • D . hardware SACG The security is higher.

Reveal Solution Hide Solution

Correct Answer: B
Question #62

When managing guest accounts, you need to create a guest account policy and set the account creation method.

For the account creation method, which of the following descriptions is wrong?

  • A . When adding accounts individually, you can choose to create them individually.
  • B . If there are a lot of users, you can choose to create in batches.
  • C . If there are many users, you can choose database synchronization
  • D . In order to facilitate management and improve user experience, self-registration can be used.

Reveal Solution Hide Solution

Correct Answer: C
Question #63

Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?

  • A . Resource pool mechanism
  • B . weighting mechanism
  • C . load balancing
  • D . Hot Standby

Reveal Solution Hide Solution

Correct Answer: A,B
Question #64

In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?

  • A . Agile Controller-Campus Integrated RADIUS All functions of server and client."
  • B . Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.
  • C . Certified equipment (like 802. 1X switch) As RADIUS On the server side, the user terminal acts as RADIUS Client.
  • D . Agile Controller-Campus As RADIUS Server side, authentication device (like 802.1X switch) As RADIUS Client.

Reveal Solution Hide Solution

Correct Answer: D
Question #65

For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?

  • A . Cannot control the number of received email attachments
  • B . When the spam processing action is an alert, the email will be blocked and an alert will be generated
  • C . You can control the size of the attachment of the received mail
  • D . Cannot perform keyword filtering on incoming mail

Reveal Solution Hide Solution

Correct Answer: C
Question #66

When a data file hits the whitelist of the firewall’s anti-virus module, the firewall will no longer perform virus detection on the file.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #67

Import the user information of the AD server on the Agile Controller-Campus to realize the user’s access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus .

Which of the following actions will be performed in the next step?

  • A . Straight forward to return authentication failure information.
  • B . Discard user information.
  • C . User 91 Information sent to AD The server performs verification.
  • D . Synchronize the database again.

Reveal Solution Hide Solution

Correct Answer: C
Question #68

Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?

  • A . It can identify the application that carries the file, the file transfer direction, the file type and the file extension.
  • B . Even if the file type is modified, it can also identify the true type of the file
  • C . It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.
  • D . It supports filtering the contents of compressed files after decompression. "

Reveal Solution Hide Solution

Correct Answer: C
Question #69

Which of the following series of devices does not support the function of accompanying business?

  • A . S5720HI Series Switch:
  • B . AR Series router
  • C . USG6000 Series firewall
  • D . SVN5600 series

Reveal Solution Hide Solution

Correct Answer: B
Question #70

Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B

Question #71

If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More select)

  • A . PDF heuristic sandbox
  • B . PE heuristic sandbox
  • C . Web heuristic sandbox
  • D . Heavyweight sandbox (virtual execution)

Reveal Solution Hide Solution

Correct Answer: A,C,D
Question #72

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #73

Regarding CAPWAP encryption, which of the following statements is wrong?

  • A . CAPWAP The data tunnel can be used DTLS Encrypted.
  • B . DTLS Support two authentication methods: Certificate authentication(out AC,AP Already brought)with PSK Password authentication.
  • C . DTLS Encryption can guarantee AC The issued control messages will not be eavesdropped on.
  • D . Use the certificate method to carry out DTLS Negotiation, the certificate is only used to generate the key, not right AP Perform authentication.

Reveal Solution Hide Solution

Correct Answer: A
Question #74

Which of the following attacks are attacks against web servers? (multiple choices)

  • A . Website phishing deception
  • B . Website Trojan
  • C . SQL injection
  • D . Cross-site scripting attacks 2335

Reveal Solution Hide Solution

Correct Answer: C,D
Question #75

The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.

Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?

  • A . Press "0U" to synchronize
  • B . AO Synchronize by "group", "0U describes the organizational structure
  • C . AO Press "Group" "Synchronize," "Group" Jida organization structure
  • D . LDAP synchronization by "group"

Reveal Solution Hide Solution

Correct Answer: A
Question #76

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

  • A . DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0
  • B . DF bit is 023, MF bit is 1 or Fragment Offset is not 0,
  • C . DF bit is 0, and Fragment Offset + Length> 65535.
  • D . The DF bit is 1, and Fragment Ofset + Length <65535.

Reveal Solution Hide Solution

Correct Answer: A,C
Question #77

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #78

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

  • A . Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.
  • B . After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP: 8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.
  • C . Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.
  • D . After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP: 8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.

Reveal Solution Hide Solution

Correct Answer: A,D
Question #79

In enterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding the description of binding the terminal host and account, which of the following is correct?

  • A . exist Any Office When logging in with an account for the first time, the terminal host is automatically bound to the current account, but the automatic binding process requires administrator approval
  • B . When other accounts need to be authenticated on the bound terminal host, there is no
    need to find the asset owner who is bound for the first time to authorize themselves.
  • C . Binding terminal hosts and accounts is only applicable to terminal users through Any Office Scenarios for authentication, Not applicable Web Agent Plugins and Web The scenario where the client authenticates.
  • D . There are only consoles in the account binding terminal host, which cannot be configured by the administrator.

Reveal Solution Hide Solution

Correct Answer: C
Question #80

Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)

  • A . Double click on the desktop"Start Server"The shortcut starts.
  • B . choose"Start>all programs> Huawei> MCServer> StartServer.
  • C . choose"Start>all programs> Huawei> Agile Controller> Server Startup Config"To manually start the required components.
  • D . choose"Start 3 all programs> Huawei> MCServer> Sever Startup Conig",Manually start the required components

Reveal Solution Hide Solution

Correct Answer: A,B

Question #81

Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #82

Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?

  • A . Ordinary attacks will usually be cleaned locally first.
  • B . If there is a large traffic attack on the network, send it to the cloud cleaning center to share the cleaning pressure.
  • C . Since the Cloud Cleaning Alliance will direct larger attack flows to the cloud for cleaning, it will cause network congestion.
  • D . The closer to the attacked self-labeled cloud cleaning service, the priority will be called.

Reveal Solution Hide Solution

Correct Answer: C
Question #83

Terminal fault diagnosis tool can diagnose fault, also can collect terminal information.

  • A . TRUE
  • B . FALSE

Reveal Solution Hide Solution

Correct Answer: A
Question #84

Which of the following are typical intrusions? "Multiple choice)

  • A . Computer is infected by U disk virus
  • B . Abnormal power interruption in the computer room
  • C . Tampering with Web pages
  • D . Copy/view sensitive data

Reveal Solution Hide Solution

Correct Answer: C,D
Question #85

Which of the following options is not included in the mobile terminal life cycle?

  • A . Obtain
  • B . deploy
  • C . run
  • D . Uninstall

Reveal Solution Hide Solution

Correct Answer: D
Question #86

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #87

Use hardware SACG Access control, In hardware SACG View the results of the conversation table on the deduction.

Which of the following statements are correct? (Multiple choice)

  • A . 192.168.1.0 definitely is Agile Controller-Campus Manager IP address
  • B . if 192.126.200.11 Is the server of the post-authentication domain, then IP Address is 192.18.0.1 If your terminal has not passed the authentication, it is possible to access the server.
  • C . 192.168.100.1 definitely is Agile Controller-Campus Controller IP address.
  • D . If in 6 Within minutes of the conversation 192.168.0.19 154->/192.162.0.11: 15080 Not refreshed, IP Address is 192.168.0.119 If the device wants to IP Address is 192.168.200.11 For device communication, the session must be re-established.

Reveal Solution Hide Solution

Correct Answer: A,B,D
Question #88

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #89

Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #90

Which of the following iterations is correct for the description of the management center?

  • A . The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary
    The stream is reported to the management server for report presentation.
  • B . The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.
  • C . The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.
  • D . The management center is divided into two parts: management server and teaching data collector.

Reveal Solution Hide Solution

Correct Answer: D

Question #91

Regarding asset management, which of the following descriptions is wrong?

  • A . Asset management can register assets automatically or manually.
  • B . Enable the automatic asset registration mode, the asset registration process does not require end users to participate.
  • C . Automatic registration of assets is suitable for situations where the asset number is automatically maintained by the business manager.
  • D . Manually registering assets means that the administrator I Way to create an asset record on the business manager, and put the asset number in Any Office Enter it to complete the asset registration process.

Reveal Solution Hide Solution

Correct Answer: D
Question #92

If the regular expression is "abc. de", which of the following will not match the regular expression?

  • A . abcde
  • B . abcdde
  • C . abclde
  • D . abc+de

Reveal Solution Hide Solution

Correct Answer: A
Question #93

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.

Or the equipment resources are exhausted .

Which of the following options is not included in traffic attack packets?

  • A . TCP packets
  • B . UDP packet
  • C . ICMP message
  • D . FTP message

Reveal Solution Hide Solution

Correct Answer: D
Question #94

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

  • A . The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.
  • B . It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa
  • C . Port mirroring needs to be configured on the management center to monitor abnormal traffic.
  • D . The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:

Reveal Solution Hide Solution

Correct Answer: A,B
Question #95

What content can be filtered by the content filtering technology of Huawei USG6000 products?

  • A . File content filtering
  • B . Voice content filtering
  • C . Apply content filtering..
  • D . The source of the video content

Reveal Solution Hide Solution

Correct Answer: A,C
Question #96

A policy template is a collection of several policies. In order to audit the security status of different terminal hosts and the behavior of end users, the administrator needs to customize.

The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (Multiple choice)

  • A . When configuring the policy template, you can inherit the parent template and modify the parent template policy
  • B . Only the strategy in the strategy template can be used, and the administrator cannot customize the strategy.
  • C . You can assign a policy template to a certain network segment.
  • D . If different policy templates are applied to departments and accounts, the policy template assigned to the highest priority will take effect. The priority relationship of the number is: account>department

Reveal Solution Hide Solution

Correct Answer: C,D
Question #97

Which of the following options are correct for the description of visitor management? (Multiple choice)

  • A . Visitor registration account can be configured to be exempt from approval
  • B . Guest login can only be configured as Web Way of webpage
  • C . Anonymous account authentication cannot be performed on the guest authentication page
  • D . Visitor account approval information can be notified to visitors via SMS

Reveal Solution Hide Solution

Correct Answer: A,D
Question #98

In some scenarios, an anonymous account can be used for authentication .

What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

  • A . The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.
  • B . Agile Controller-Campus Need to be manually created"~anonymous"account number.
  • C . By default, the access control and policy of anonymous accounts cannot be performed.
    1 Operations such as invoking patch templates and software distribution.
  • D . Administrators cannot delete anonymous accounts"~anonymous*.

Reveal Solution Hide Solution

Correct Answer: A,D
Question #99

On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)

  • A . all Ad-hoc The device will be directly judged as an illegal device
  • B . Not this AC Access AP Is illegal AP
  • C . Not this AC Access STA Is illegal STA
  • D . Not this AC Access STA, Also need to check access AP Does it contain law

Reveal Solution Hide Solution

Correct Answer: A,D
Question #100

Which of the following options is for Portal The description of the role of each role in the authentication system is correct?

  • A . The client is Any 0fice software.
  • B . Portal The role of the server is to receive client authentication requests, provide free portal services and authentication interfaces, and exchange client authentication information with access devices.
  • C . RADIUS The role of the server is to authenticate all the users in the network segment HTTP Requests are redirected to Portal server.
  • D . The role of admission control equipment is to complete the authentication, authorization and accounting of users.

Reveal Solution Hide Solution

Correct Answer: B

Question #101

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

  • A . The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source
  • B . For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify The legitimacy of the source IP.
  • C . In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process
    It will consume the TCP connection resources of the OINS cache server.
  • D . Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version