Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following zones is not the firewall default security zone?

A.

Trust

B.

The Local

C.

DMZ

D.

Management

Which of the following functions help implement IPsec secure transmission of user service data on the Internet by means of encryption and authentication?

A.

Data encryption

B.

Data origin authentication

C.

Anti-replay

D.

Data integrity check

IPS signatures describe the characteristics of attack behaviors on the network. The firewall detects and defends against attacks by comparing data flows with IPS signatures.

A.

TRUE

B.

FALSE

The network environment is becoming more and more complex, and network security incidents occur frequently. While accelerating the construction of informatization, enterprises must not only resist external attacks, but also prevent internal management personnel from being involved in data leakage and operation and maintenance accidents due to operational errors and other issues. Which of the following options might reduce operational risk?

A.

According to the administrator configuration, the O & M user corresponds to the background resource account, and restricts the unauthorized use of the account. mouth Based on the password security policy, the O & M security audit system automatically modifies the password of the background resource account at regular intervals.

B.

Each system is independently operated, maintained and managed, and the access process is not audited and monitored.

C.

Oral Each department system is independently authenticated and uses a single static password for authentication.

Which of the following protocols is a multichannel protocol?

A.

The Telnet

B.

THE HITP

C.

FTP

D.

The SSH

Please match the following information security risks to information security incidents one by one.[fill in the blank]*

physical security risk Enterprise server permissions are loosely set

Information Security Management Risk Infected Panda Burning Incense

Information Access Risk Fire destroyed equipment in computer room

application risk Talk to people about leaking company secrets

Which of the following NAT technologies can implement a public network address to provide source address translation for multiple private network addresses ( )*

A.

NAPT

B.

NAT Server

C.

Easy-ip

CT Jinglu

D.

NAT No-PAT

As shown in the figure, what is the range of the AH protocol authentication range in transmission mode?

A.

The4

B.

The3

C.

The2

D.

The1

ARP man-in-the-middle attacks are a type of spoofing attack technique.

A.

TRUE

B.

FALSE

Huawei Firewall only supports the inter-domain persistent connection function for TCP packets.

A.

TRUE

B.

FALSE