HRP (Huawei Redundancy Protocol) Protocol to back up the connection state of data include: (Multiple Choice)
HRP (Huawei Redundancy Protocol) Protocol to back up the connection state of data include: (Multiple Choice)A . TCP/UDP sessions tableB . Server Map tableC . the dynamic blacklistD . the routing tableView AnswerAnswer: ABC
The Huawei Redundancy Protocol (HRP) is used to synchronize the main firewall configuration and connection status and other data on the backup firewall to synchronize . Which of the following options is not in the scope of synchronization?
The Huawei Redundancy Protocol (HRP) is used to synchronize the main firewall configuration and connection status and other data on the backup firewall to synchronize . Which of the following options is not in the scope of synchronization?A . Security policyB . NAT policyC . BlacklistD . IPS signature setView AnswerAnswer: D
Caesar Code is primarily used to encrypt data by using a stick of a specific specification.
Caesar Code is primarily used to encrypt data by using a stick of a specific specification.A . TrueB . FalseView AnswerAnswer: B
Which of the following is not part of the method used in the Detection section of the P2DR model?
Which of the following is not part of the method used in the Detection section of the P2DR model?A . Real-time monitoringB . TestingC . AlarmD . Shut down the serviceView AnswerAnswer: C
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information flow, and analyze the correlation of time. Which of the following is not an evidence analysis technique?
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information flow, and analyze the correlation of time. Which of the following is not an evidence analysis technique?A . Password deciphering, data decryption technologyB . Document Digital Abstract Analysis TechnologyC . Techniques for...
In some scenarios, it is necessary to convert the source IP address and the destination IP address. Which of the following techniques is used in the scenario?
In some scenarios, it is necessary to convert the source IP address and the destination IP address. Which of the following techniques is used in the scenario?A . Two-way NATB . Source NATC . NAT-ServerD . NAT ALGView AnswerAnswer: A
Which of the following attacks does not belong to special packet attack?
Which of the following attacks does not belong to special packet attack?A . ICMP redirect packet attackB . ICMP unreachable packet attackC . IP address scanning attackD . Large ICMP packet attackView AnswerAnswer: C
IPSec VPN technology does not support NAT traversal when encapsulating with ESP security protocol, because ESP encrypts the packet header.
IPSec VPN technology does not support NAT traversal when encapsulating with ESP security protocol, because ESP encrypts the packet header.A . TrueB . FalseView AnswerAnswer: B
Which of the following options is the correct sequence of the four phases of the Information Security Management System (ISMS)?
Which of the following options is the correct sequence of the four phases of the Information Security Management System (ISMS)?A . Plan->Check->Do->ActionB . Check->Plan->Do->ActionC . Plan->Do->Check->ActionD . Plan->Check->Action->DoView AnswerAnswer: C
“Being good at observation” and “keeping suspicion” can help us better identify security threats in the online world.
“Being good at observation” and “keeping suspicion” can help us better identify security threats in the online world.A . TrueB . FalseView AnswerAnswer: A