Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission
Ways to use a computer to store information about criminal activity that is not a computer crime
firewallTrustClients in the domain can log inUntrustin the domainFTPserver, but the file cannot be downloaded, which of the following can solve the problem? (multiple choice)
Which of the following options is correct for the description of a buffer overflow attack?(multiple choice)
IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data
EuropeTCSECThe guidelines are divided into two modules, functional and evaluation, and are mainly used in the military, government and commercial fields
Which of the following options areIATF(Information Assurance Technology Framework) core elements of the model? (multiple choice)
Which of the following options are correct regarding the description of Windows log event types? (multiple choice)
existUSGConfigure on the system firewallNAT Server, will produceserver-mapTable, which of the following is not part of this representation?
Which of the following is an action to be taken during the summary phase of a cybersecurity emergency response? (multiple choice)
In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)
Equipment sabotage attacks are generally not easy to cause information leakage, but usually cause interruption of network communication services.
After the firewall detects a virus, which of the following will release the virus? ( )[Multiple choice]*
When configuring security policies, you can control traffic based on the user's______.[fill in the blank]*
Personal information leakage is the destruction of the ______ characteristics of information.[fill in the blank]*
Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)
Which of the following options belong to the default security zone of Huawei Firewall? (multiple choice)
Digital signature technology obtains a digital signature by encrypting which of the following data?
When an enterprise establishes its own information system, it checks each operation according to the authoritative standards formulated by the international, and can check whether its own information system is safe or not.
Which of the following statements is true about Huawei's routers and switchers??(multiple choice)
Which of the following descriptions about digital fingerprints in digital signatures is wrong? ( )[Multiple choice]*
According to the management specification, regularly check the network security system and equipment, upgrade the patch, and organize the network security emergency response drill. The above actions belong toMPDRRWhat are the elements of the network security model?
Which of the following protocols is not a protocol type that ASPF can detect? ( )[Multiple choice]*
The content of intrusion detection covers all kinds of authorized and unauthorized intrusion behaviors. Which of the following behaviors does not belong to the scope of intrusion detection?
The world's first worm-"Morris Worm"Make people realize that with the deepening of people's dependence on computers, the possibility of computer network being attacked is also increasing, and it is necessary to establish a sound emergency response system
IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data
In which of the following scenarios does the firewall generate the Server map table? ( )
If there is a practical change in the company structure, it is necessary to re-test whether the business continuity plan is feasible
Which of the following is not the business scope of the National Internet Emergency Response Center?
Which of the following is true about the difference between pre-incident prevention strategies and post-incident recovery strategies? (multiple choice)
Which of the following is not a requirement for dual-system hot backup of a firewall?
When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*
firewallGE1/0/1andGE1/0/2mouth belongs toDMZarea, if you want to implementGE1/0/1The connected area is accessibleGE1/0/2Connected area, which of the following is correct?
Which of the following are the basic functions of antivirus software? (multiple choice)
aboutNATAddress translation, which of the following statements is europium false??
The steps of the security assessment method do not include which of the following?
About disconnectTCPIn the description of the connection four-way handshake, which of the following is false?
Which of the following does not belong toP2DRin the modelDetectionThe method used in the link?
aboutGREEncapsulation and decapsulation, which of the following descriptions is false?
Regarding the description of vulnerability scanning, which of the following is false?
An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*
Information security precautions include both management and technical measures. Which of the following measures is not a precautionary method for information security technology?
Which of the following security threats are terminal security threats? (multiple choice)
The initial priority of the USG9500VGMP group is related to which of the following factors ( )? *
If we do not want to generate a reverse Server Mapi entry when configuring NAT Server, we need to add a parameter when configuring NATServerE. This parameter is ( ) (fill in the blank)
With the development of technology, some new technologies have emerged in electronic forensics. Which of the following items are new forensics technologies?
Which of the following options are available for IPSec VPN peer authentication?
( ) means that the computer system has defects and deficiencies in the specific matters of hardware, software, protocols or system security policies. (Chinese Standard Terminology) (fill in the blank)
After the company network administrator configures the dual-system hot backup, he wants to check the status of the current VGMP group, so he typed the command and displayed the following information
HRP_M
Role: active, peer: active
Running priority:45000, peer:45000
Backup channel1 usage: 30x
Stab1 e time: 1days, 13 hours, 35 minutes
Last state change information: 2020-03-22 16:01:56 HRP core state changed, old_state=normal (active), new_state=normal
(active).local priority F 4
peer_priority 45000.
Configuration:
hello interval: 1000ms
preempt: 60s
mirror configuration:off
mirror session:on
track trunk member:on
auto-sync configuration:on
auto-sync connection- status:on
adjust ospf cost:on
adjust ospfv3-cost:on
adjust bgp-cost:on
nat resource: off
Detail information on:
Gigabi tEthernet0/0/1:up
Gigabi tEthernet0/0/3:up
ospf-cost: +0
then the command he typed in the blank is[fill in the blank]*
Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in the blank)
There are three types of frame forwarding behaviors: flooding, ( ), and discarding. (fill in the blank)
Heartbeat message (He11o message): The two FWs send heartbeat messages to each other periodically (the default period is ( ) seconds) to check whether the peer device is alive. (fill in the blank)
Which of the following descriptions about the heartbeat interface is wrong ( )?[Multiple choice]*
( ) is an "indirect intrusion attack. This attack mode is to virtually place a computer controlled by an intruder between two communicating computers in a network connection through various technical means. (fill in the blank)
The backup methods of dual-system hot backup include automatic backup ( ), manual batch backup, and automatic synchronization of the configuration of the active and standby FW after the device restarts. (fill in the blank)
The administrator is connected to the firewall through the G1/0/0 interface (the interface has been added to the Trust Zone). If the administrator is allowed to perform configuration management through the G1/0/0 login image firewall, how to configure the security policy to release flow direction? ( )[Multiple choice]*
In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*