HRP (Huawei Redundancy Protocol) Protocol to back up the connection state of data include: (Multiple Choice)

HRP (Huawei Redundancy Protocol) Protocol to back up the connection state of data include: (Multiple Choice)A . TCP/UDP sessions tableB . Server Map tableC . the dynamic blacklistD . the routing tableView AnswerAnswer: ABC

December 28, 2018 No Comments READ MORE +

The Huawei Redundancy Protocol (HRP) is used to synchronize the main firewall configuration and connection status and other data on the backup firewall to synchronize . Which of the following options is not in the scope of synchronization?

The Huawei Redundancy Protocol (HRP) is used to synchronize the main firewall configuration and connection status and other data on the backup firewall to synchronize . Which of the following options is not in the scope of synchronization?A .  Security policyB . NAT policyC .  BlacklistD . IPS signature setView AnswerAnswer: D

December 27, 2018 No Comments READ MORE +

Caesar Code is primarily used to encrypt data by using a stick of a specific specification.

Caesar Code is primarily used to encrypt data by using a stick of a specific specification.A . TrueB . FalseView AnswerAnswer: B

December 27, 2018 No Comments READ MORE +

Which of the following is not part of the method used in the Detection section of the P2DR model?

Which of the following is not part of the method used in the Detection section of the P2DR model?A .  Real-time monitoringB .  TestingC .  AlarmD .  Shut down the serviceView AnswerAnswer: C

December 16, 2018 No Comments READ MORE +

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information flow, and analyze the correlation of time. Which of the following is not an evidence analysis technique?

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information flow, and analyze the correlation of time. Which of the following is not an evidence analysis technique?A .  Password deciphering, data decryption technologyB .  Document Digital Abstract Analysis TechnologyC .  Techniques for...

December 11, 2018 No Comments READ MORE +

In some scenarios, it is necessary to convert the source IP address and the destination IP address. Which of the following techniques is used in the scenario?

In some scenarios, it is necessary to convert the source IP address and the destination IP address. Which of the following techniques is used in the scenario?A .  Two-way NATB .  Source NATC . NAT-ServerD . NAT ALGView AnswerAnswer: A

December 9, 2018 No Comments READ MORE +

Which of the following attacks does not belong to special packet attack?

Which of the following attacks does not belong to special packet attack?A . ICMP redirect packet attackB . ICMP unreachable packet attackC . IP address scanning attackD .  Large ICMP packet attackView AnswerAnswer: C

November 30, 2018 No Comments READ MORE +

IPSec VPN technology does not support NAT traversal when encapsulating with ESP security protocol, because ESP encrypts the packet header.

IPSec VPN technology does not support NAT traversal when encapsulating with ESP security protocol, because ESP encrypts the packet header.A . TrueB . FalseView AnswerAnswer: B

November 16, 2018 No Comments READ MORE +

Which of the following options is the correct sequence of the four phases of the Information Security Management System (ISMS)?

Which of the following options is the correct sequence of the four phases of the Information Security Management System (ISMS)?A . Plan->Check->Do->ActionB . Check->Plan->Do->ActionC . Plan->Do->Check->ActionD . Plan->Check->Action->DoView AnswerAnswer: C

November 15, 2018 No Comments READ MORE +

“Being good at observation” and “keeping suspicion” can help us better identify security threats in the online world.

“Being good at observation” and “keeping suspicion” can help us better identify security threats in the online world.A . TrueB . FalseView AnswerAnswer: A

November 5, 2018 No Comments READ MORE +