Which of the following features can be used for operation auditing of HUAWEI CLOUD bastion hosts?

Which of the following features can be used for operation auditing of HUAWEI CLOUD bastion hosts?A . report analysisB . Double LicenseC . Work order managementD . Action playbackView AnswerAnswer: A, C, D

September 13, 2024 No Comments READ MORE +

The USG firewall is connected to the corporate intranet through a router After the firewall is configured with the cross-Layer 3 MAC identification feature, then the security policy of the firewall can configure the MAC address as a match condition

The USG firewall is connected to the corporate intranet through a router After the firewall is configured with the cross-Layer 3 MAC identification feature, then the security policy of the firewall can configure the MAC address as a match conditionA . TRUEB . FALSEView AnswerAnswer: A

September 12, 2024 No Comments READ MORE +

Control of ping packets to the USG firewall itself. The access control management function of the interface takes precedence over the security policy.

Control of ping packets to the USG firewall itself. The access control management function of the interface takes precedence over the security policy.A . TRUEB . FALSEView AnswerAnswer: A

September 12, 2024 No Comments READ MORE +

PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion processes, usually orchestrated by certain personnel For specific goals.

PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion processes, usually orchestrated by certain personnel For specific goals.A . TRUEB . FALSEView AnswerAnswer: A

September 12, 2024 No Comments READ MORE +

In the Cloudabric scenario, which of the following ways is the firewall deployed?

In the Cloudabric scenario, which of the following ways is the firewall deployed?A . One machine deploymentB . Primary/standby dual-machine imagesC . Dual machine load sharingD . Hot standby for both active and standby machinesView AnswerAnswer: D

September 10, 2024 No Comments READ MORE +

Which of the following security options are included?

NIP provides security mechanisms from multiple levels such as administrators and logs to build the security of operation and maintenance. Which of the following security options are included?A . Administrator decentralization and domain management mechanismB . Anti-brute force mechanismC . Protection mechanism for sensitive user informationD . Access channel controlView...

September 10, 2024 No Comments READ MORE +

Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network. The source IP address matched in the security policy is the private IP address of the user.

Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network. The source IP address matched in the security policy is the private IP address...

September 9, 2024 No Comments READ MORE +

In the following description of the USG firewall security policy, which one is wrong?

In the following description of the USG firewall security policy, which one is wrong?A . When the firewall is equipped with the undo firewall packet-filter basic-protocol enable command, unicast packets are not controlled by security policiesB . By default... Broadcast packets are not controlled by security policiesC . In the...

September 8, 2024 No Comments READ MORE +

When Hisec Insight is linked with terminals, it is mainly linked with the EDR of third-party vendors with cooperative relationships.

When Hisec Insight is linked with terminals, it is mainly linked with the EDR of third-party vendors with cooperative relationships.A . TRUEB . FALSEView AnswerAnswer: A

September 8, 2024 No Comments READ MORE +

After you deploy HUAWEI CLOUD WAF Traffic to the tenant's Neb server is sent directly to the origin server Cloud WAF intercepts and detects traffic whose destination IP address is the IP address of the origin server.

After you deploy HUAWEI CLOUD WAF Traffic to the tenant's Neb server is sent directly to the origin server Cloud WAF intercepts and detects traffic whose destination IP address is the IP address of the origin server.A . TRUEB . FALSEView AnswerAnswer: B

September 7, 2024 No Comments READ MORE +