Exam4Training

Huawei H12-725_V4.0-ENU HCIP-Security V4.0 Online Training

Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

A user at Ursa Major Solar is experiencing a flow error while trying to process a record to the next status. The users with the same access can process records without any errors.

What should the administrator do to troubleshoot the issue?

  • A . Use the flow debug option and set the selection to Run as another user.
  • B . Grant the user more data access by moving them higher in the role hierarchy.
  • C . Change the flow to run as System Context Without Sharing – Access All Data.
  • D . Grant the user the Modify All permission to ensure they have full system access.

Reveal Solution Hide Solution

Correct Answer: B
Question #9

Shutdown the business interface of the standby machine;

  • A . 1-8-3-2-7-4-5-6
  • B . 8-1-3-2-4-7-5-6
  • C . 8-1-3-2-7-4-5-6
  • D . 1-8-3-4-2-7-5-6

Reveal Solution Hide Solution

Correct Answer: C
Question #10

Bandwidth channels define specific bandwidth resources and are the basis for bandwidth management.

Which of the following is a resource that can be defined in a bandwidth channel?

  • A . Bandwidth policy
  • B . Daily traffic quota
  • C . Egress bandwidth restrictions
  • D . Strategic exclusivity

Reveal Solution Hide Solution

Correct Answer: D

Question #11

Which of the following parameters is not a condition for global routing policy classification?

  • A . Bandwidth
  • B . Port number
  • C . Quality
  • D . Weight

Reveal Solution Hide Solution

Correct Answer: B
Question #12

In a NAT traversal scenario, if a NAT device is detected, the destination port number of the ISAKMP message will become which of the following?

  • A . 4500
  • B . 51
  • C . 50
  • D . 500

Reveal Solution Hide Solution

Correct Answer: A
Question #13

Which of the following descriptions about GRE over IPSec is incorrect?

  • A . The IP header added during the IPSec encapsulation process, that is, the source address is the interface address of the IPSec gateway to which the IPSec security policy is applied, and the destination address is the interface address of the IPSec peer to which the IPsec security policy is applied.
  • B . When gateways use GRE over IPSec to connect, GRE encapsulation is performed first, and then IPSec encapsulation is performed.
  • C . The IP header added during the GRE encapsulation process, that is, the source address is the source address of the IPSec tunnel, and the destination address is the destination address of the IPSec tunnel.
  • D . The data flow that IPSec needs to protect is the data flow from the GRE starting point to the GRE ending point.

Reveal Solution Hide Solution

Correct Answer: C
Question #14

Which of the following descriptions of the characteristics of SSL VPN is incorrect?

  • A . SSL VPN supports few authentication types and is difficult to integrate with the original identity authentication system.
  • B . SSL VPN can support various IP applications
  • C . SSL VPN can parse intranet resources to the application layer and publish applications in a granular manner
  • D . Since the SSL VPN login method uses a browser, the automatic installation and configuration of the client is realized, so that users can quickly log in with their devices anytime and anywhere, and it also relieves the pressure of network administrators in maintaining the client.

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Which of the following is not an intranet resource that SSL VPN can provide to mobile office users?

  • A . File resources
  • B . UDP resources
  • C . Web resources
  • D . IP resources

Reveal Solution Hide Solution

Correct Answer: B
Question #16

As shown in the figure, which of the following is the UDP defense principle shown in the figure?

  • A . Fingerprint learning
  • B . Load Check
  • C . Relevant defense
  • D . Session check

Reveal Solution Hide Solution

Correct Answer: B
Question #17

Which of the following is a method to prevent Tracert packet attacks?

  • A . Discard IP packets with time offset
  • B . Discard the detected ICMP messages or UDP messages that have expired, or the destination port is unreachable.
  • C . Users can configure the maximum length of ICP packets allowed to pass according to actual network needs. When the length of the actual IP packet exceeds this value, the packet will be discarded.
  • D . Discard ICMP unreachable messages and record attack logs

Reveal Solution Hide Solution

Correct Answer: B
Question #18

Which of the following is not the responsibility of the Anti-DDos defense system management center?

  • A . Security report analysis
  • B . Device Management
  • C . Issue defense strategies
  • D . Carry out traffic diversion

Reveal Solution Hide Solution

Correct Answer: D
Question #19

Which of the following descriptions of URL classification is incorrect?

  • A . Custom URL classification requires manual configuration by the administrator.
  • B . The predefined URL categories are preset at the factory and do not require the administrator to manually load them.
  • C . Predefined URL categories cannot be created, deleted, or renamed
  • D . Predefined URL categories have higher priority than custom URL categories

Reveal Solution Hide Solution

Correct Answer: D
Question #20

Which of the following descriptions of keywords in content filtering is incorrect?

  • A . Regular expression matching is more flexible and efficient than text matching, but the configuration needs to follow the regular expression rules.
  • B . Keywords include predefined keywords and custom keywords
  • C . Predefined keywords are keywords that are manually defined by the administrator and can be identified
  • D . The minimum length of keywords that can be matched by text and regular expressions is 3 bytes.

Reveal Solution Hide Solution

Correct Answer: C

Question #21

If the administrator needs to set some signature actions to be different from the signature filter, you can configure exception signatures.

Which of the following is not an exception signature action?

  • A . release
  • B . Block and isolate high-source IP addresses
  • C . Block after alarm and exceeding the threshold
  • D . Block and isolate the destination IP

Reveal Solution Hide Solution

Correct Answer: C
Question #22

Which of the following descriptions of IPS top definition signatures is incorrect?

  • A . The content of predefined signatures is not fixed and can be created, modified or deleted.
  • B . When the action of the predefined signature is blocking, block the packets that hit the signature and record the log.
  • C . When the action of the predefined signature is release, the packets that hit the signature will be released and no log will be recorded.
  • D . When the action of the predefined signature is alarm, the packets that hit the signature will be released, but the log will be recorded.

Reveal Solution Hide Solution

Correct Answer: A
Question #23

IPS (Intrusion Prevention System) is an application layer security device that can identify network attacks based on which of the following?

  • A . Port number
  • B . Destination IP address
  • C . Feature library
  • D . Source IP address

Reveal Solution Hide Solution

Correct Answer: C
Question #24

Which of the following commands can be used to check the CPU and memory utilization of the current process on the Linux host?

  • A . iostat
  • B . top
  • C . df-h
  • D . free

Reveal Solution Hide Solution

Correct Answer: B
Question #25

In order to determine whether the Linux host has been added to a path other than the system default or normal business program registration, which environment variable of the Linux system can be checked?

  • A . $HOSTNAME
  • B . $SHELL
  • C . $HOME
  • D . $PATH

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Which of the following descriptions of HWTACACS protocol features is incorrect?

  • A . Use shared key encryption, but only encrypt the password field in the authentication message.
  • B . Supports authorized use of configuration commands on the device, mostly used for device authentication
  • C . Based on TCP transport layer protocol, network transmission reliability is high
  • D . Authentication, authorization and accounting functions are separated, so authentication, authorization and accounting services can be deployed on different servers respectively.

Reveal Solution Hide Solution

Correct Answer: A
Question #27

When configuring authentication rules on iMaster NCE-Campus, which of the following types of authentication methods is not supported as a matching condition?

  • A . Device Management Certification
  • B . Wireless user authentication
  • C . User access authentication
  • D . MAC authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #28

Which authentication method is generally used in situations where new networks are built, users are concentrated, and information security requirements are strict?

  • A . Portal certification
  • B . 802.1x authentication
  • C . MAC priority Porta1 authentication
  • D . MAC authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #29

Which of the following statements about the features of the firewall hot standby system version upgrade is incorrect?

  • A . When a bug occurs in the live network fire protection system version, the system version needs to be upgraded.
  • B . When the existing network fire protection system version does not support certain features, the system version needs to be upgraded.
  • C . Version upgrade has requirements for the device model and version before the upgrade
  • D . When upgrading the dual-machine hot audio version, the rule of thumb is to upgrade the Active device first, and then upgrade the Standby device.

Reveal Solution Hide Solution

Correct Answer: D
Question #30

Which of the following descriptions of outbound traffic in the firewall virtual system is correct?

  • A . Traffic flowing from the private network interface to the public network interface is limited by the bandwidth in the inbound direction.
  • B . Traffic flowing from the public network interface to the private network interface is limited by the bandwidth in the inbound direction.
  • C . Traffic flowing from the private network interface to the public network interface is limited by the outbound bandwidth.
  • D . Traffic flowing from the public network interface to the private network interface is limited by the outbound bandwidth.

Reveal Solution Hide Solution

Correct Answer: C

Question #31

Which of the following descriptions about virtual system offloading is incorrect?

  • A . When the interface works at Layer 2, VLAN-based traffic distribution is used.
  • B . When the interface works at Layer 3, the interface-based offloading method is adopted.
  • C . Through offloading, packets entering the device can be sent to the correct virtual system for processing.
  • D . When using interface-based offloading, the management port can be assigned to a designated virtual system.

Reveal Solution Hide Solution

Correct Answer: D
Question #32

Which of the following is not an implementation process of bandwidth management?

  • A . Bandwidth channel
  • B . Traffic Analysis
  • C . Interface speed limit
  • D . Bandwidth policy

Reveal Solution Hide Solution

Correct Answer: B
Question #33

Which of the following descriptions of policy routing execution actions is incorrect?

  • A . Unable to forward traffic to other virtual systems according to policy routing
  • B . Policy routing is not required and forwarding is performed according to the existing routing table.
  • C . Use the intelligent routing function to select one outbound interface from multiple outbound interfaces to send messages.
  • D . Send the packet to the specified next-hop device or send the packet from the specified outbound interface

Reveal Solution Hide Solution

Correct Answer: A
Question #34

Which of the following prevention technologies can Huawei firewalls adopt?

  • A . Source detection
  • B . Fingerprint prevention
  • C . The first packet is discarded
  • D . Current limiting

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Which of the following is the correct ordering of URL matching methods?

  • A . Exact matching > Suffix matching > Prefix matching > Keyword matching
  • B . Prefix matching > Suffix matching > Keyword matching > Exact matching
  • C . Keyword matching > Suffix matching > Suffix matching > Exact matching
  • D . Keyword matching>Prefix matching>Suffix matching>Exact matching

Reveal Solution Hide Solution

Correct Answer: A
Question #36

Which of the following descriptions of the email content filtering operating mechanism is incorrect?

  • A . The firewall first needs to identify the traffic to be filtered based on matching conditions.
  • B . When a POP3 or IMAP message is detected, if it is determined to be an illegal email, the firewall’s response action can be to send an alarm message or block the email.
  • C . Email content filtering is only detected in the outbound direction
  • D . After the firewall filters out email traffic, it then checks the email address and attachment size to identify illegal emails.

Reveal Solution Hide Solution

Correct Answer: C
Question #37

Which of the following is not an abnormality in the file type identification results?

  • A . File extension mismatch
  • B . The file type cannot be recognized
  • C . File corruption
  • D . The file is compressed

Reveal Solution Hide Solution

Correct Answer: D
Question #38

The administrator has defined two keywords that need to be identified on the firewall. The keyword administrator has defined two keywords that need to be identified on the firewall. The weight value of keyword X is 2 and the weight value of keyword Y is 3. The alarm threshold for content filtering is defined as 5 and the blocking threshold is 10. If the device detects that the keyword X exists once and the keyword Y twice exists in the webpage browsed by the user.

Regarding the weight value and the behavior of users accessing web pages, which of the following statements is correct?

  • A . The weight value is 8 and you can access the web page
  • B . The weight value is 10 and the web page cannot be accessed.
  • C . The weight value is 8 and the web page cannot be accessed.
  • D . The weight value is 10 and you can access the web page

Reveal Solution Hide Solution

Correct Answer: A
Question #39

WAF device’s working mode does not include which of the following?

  • A . Forward proxy
  • B . Reverse proxy
  • C . Bridge mode
  • D . Transparent proxy

Reveal Solution Hide Solution

Correct Answer: A
Question #40

WAF devices can effectively and accurately resist CC attacks. Which of the following descriptions of CC attacks is incorrect?

  • A . CC attack is a type of DDoS attack
  • B . The attack cost of CC attacks is relatively high, and launching an attack requires a large amount of bandwidth resources.
  • C . CC attacks can use proxy servers to launch attacks, making it difficult to trace the source of the attack.
  • D . CC attacks are mainly used to attack web servers, causing server resources to be exhausted and even shut down.

Reveal Solution Hide Solution

Correct Answer: B

Question #41

There is a log message in the firewall device, as shown below:

Jun 1 2022 14:27:01 FV3 %%01UPDATE/3/1LOAD_FALL (1) [182]: Failed to load the signature database. (SyslogId=0, Module-IP-RIPUTATION, Slot=11, CFU=0, LoadVersion=, Duration (s) =0, Reason="No SDB version is available for loading").

Which of the following does the "UPDATE" field in this log represent?

  • A . Summary of log information
  • B . Log description information
  • C . Log level
  • D . The functional module that generated the log

Reveal Solution Hide Solution

Correct Answer: B
Question #42

Which item does the authentication protocol of Portal authentication not include?

  • A . EAP protocol
  • B . HTTP protocol
  • C . Portal protocol
  • D . HTTPS protocol

Reveal Solution Hide Solution

Correct Answer: A
Question #43

The LDAP protocol is based on the Client/Server structure to provide binding and query of directory information. All directory information is stored on the LDAP server. In the LDAP protocol, the directory is organized according to a tree structure. The directory is composed of entries, and the entries are attribute sets with distinguished names (DN).

Which of the following is a domain name attribute of LDAP?

  • A . DC
  • B . CN
  • C . OU
  • D . DN

Reveal Solution Hide Solution

Correct Answer: A
Question #44

Use iNaster NCE-Campus as the Portal server and deploy Portal authentication on the Huawei wireless controller. Which configuration is not necessary?

  • A . URL template
  • B . Certification Template
  • C . Portal authentication template
  • D . MAC authentication template

Reveal Solution Hide Solution

Correct Answer: D
Question #45

In the MAC address authentication scenario, the user does not need to manually enter the user name and password. Which of the following is used as the authenticated user name?

  • A . Account number
  • B . IP address
  • C . Interface number
  • D . MAC address

Reveal Solution Hide Solution

Correct Answer: D
Question #46

Which of the following descriptions about Huawei IPS equipment upgrade is correct?

  • A . Upgrading the signature database of Huawei IPS does not require license authorization.
  • B . Upgrading the system version of Huawei IPS will take effect without restarting the device.
  • C . Upgrading the signature database of Huawei IPS requires restarting the device to take effect.
  • D . Upgrade the Huawei IPS signature database to take effect without restarting the device.

Reveal Solution Hide Solution

Correct Answer: D
Question #47

Which of the following descriptions of policy routing matching rules is incorrect?

  • A . When configuring multiple policy routing rules, the policy routing list is arranged in the order of configuration by default.
  • B . If multiple values can be configured in a matching condition, and there is an "OR" relationship between the multiple values, as long as the attributes of the message match any one value, the attributes of the message are considered to match this condition.
  • C . Each policy route contains only one matching condition
  • D . There is a default policy route default in the system by default. The default policy route is at the bottom of the policy list and has the lowest priority. All matching conditions are any and the action is no policy routing.

Reveal Solution Hide Solution

Correct Answer: C
Question #48

Which of the following parameters is not a condition for link quality check?

  • A . Delay
  • B . Bandwidth
  • C . Jitter
  • D . Packet loss rate

Reveal Solution Hide Solution

Correct Answer: B
Question #49

Which of the following is not a functional feature of AH?

  • A . Integrity check
  • B . Anti-replay
  • C . Data source verification
  • D . Data encryption

Reveal Solution Hide Solution

Correct Answer: D
Question #50

Which of the following is a probe protocol that health checks cannot support?

  • A . RADIUS
  • B . CHCMP
  • C . DNS
  • D . UDP

Reveal Solution Hide Solution

Correct Answer: D

Question #51

Which of the following descriptions about guaranteed bandwidth and maximum bandwidth is incorrect?

  • A . Guaranteed bandwidth and maximum bandwidth can be set on a per-IP/user basis
  • B . If the traffic is greater than the maximum bandwidth, directly discard the traffic exceeding the maximum bandwidth.
  • C . If the traffic is less than the guaranteed bandwidth, this part of the traffic will compete freely with the same type of traffic in other bandwidth channels on the outbound interface for bandwidth resources.
  • D . Guaranteed bandwidth and maximum bandwidth settings for IP or users can achieve more detailed bandwidth restrictions

Reveal Solution Hide Solution

Correct Answer: C
Question #52

Which of the following descriptions about deploying a firewall virtual system is incorrect?

  • A . A resource class can be bound to multiple virtual systems at the same time
  • B . You can view the created virtual systems and allocated resources in the "Virtual System List"
  • C . Configure the resource class first, and then enable the virtual system for binding
  • D . Resource class r0 is bound to the root system by default and cannot be deleted or modified.

Reveal Solution Hide Solution

Correct Answer: C
Question #53

As shown in the figure, the firewall load balancing network is used, and the upstream and downstream devices are switches.

Which of the following descriptions of the firewall VGMP group status in this scenario is correct?

  • A . Firewall A: Active, Firewall B: Standby
  • B . Firewall A: Master, Firewall B: Backup
  • C . Firewall A: Master, Firewall B: Master
  • D . Firewall A: Active, Firewall B: Active

Reveal Solution Hide Solution

Correct Answer: D
Question #54

Which of the following is not part of the consistency check of dual-machine hot standby?

  • A . Interface address
  • B . NAT configuration
  • C . Bandwidth Policy
  • D . Security policy

Reveal Solution Hide Solution

Correct Answer: B
Question #55

As shown in the figure, the firewall is deployed as a gateway dual-machine hot standby, and the upstream and downstream devices are switches.

To achieve round-trip traffic load balancing, at least how many VRRP backup groups need to be configured in this scenario?

  • A . 4
  • B . 6
  • C . 2
  • D . 3

Reveal Solution Hide Solution

Correct Answer: C
Question #56

When a visitor accesses the corporate network through Portal authentication, in order to ensure a good visitor experience, the visitor is required to open the wireless network range for a short period of time. When re- entering, there is no need to enter the username and password again and they can directly access the network.

Which of the following access methods can meet the above requirements?

  • A . MAC bypass authentication
  • B . MAC authentication
  • C . MAC priority Portal authentication
  • D . 802.1X authentication

Reveal Solution Hide Solution

Correct Answer: C
Question #57

When using an LDAP server as the authentication server, if you want to perform user authentication, which of the following operations needs to be performed on the data of the LDAP server?

  • A . Query class
  • B . Delete class
  • C . Writing class
  • D . Update class

Reveal Solution Hide Solution

Correct Answer: A
Question #58

When using an LDAP server as the authentication server, which of the following protocols is used for the interaction between the device and the server?

  • A . RADIUS protocol
  • B . HTTP protocol
  • C . LDAP protocol
  • D . EAP protocol

Reveal Solution Hide Solution

Correct Answer: C
Question #59

If you want to control users’ forum postings, user logins, etc., which of the following HTTP behavior controls should be configured?

  • A . POST operation
  • B . Redirect
  • C . File upload
  • D . File download

Reveal Solution Hide Solution

Correct Answer: A
Question #60

A user uses SSL to access network resources on the intranet. The administrator has enabled file sharing and web proxy services for the user, and has allowed the traffic of the service on the firewall. However, after the user enters the address of the virtual gateway on the PC, the web page fails. I cannot see the list of file shares and web proxies. Which of the following options may cause this failure?

  • A . The virtual gateway’s external NAT port is wrong.
  • B . Has the virtual IP address been obtained from the virtual network card of the user’s PC?
  • C . The administrator does not have the authorization to configure file sharing and web proxy for the user
  • D . The route between the firewall and the client is unreachable

Reveal Solution Hide Solution

Correct Answer: C

Question #61

How many levels of bandwidth policies does the firewall support?

  • A . 2
  • B . 5
  • C . 4
  • D . 3

Reveal Solution Hide Solution

Correct Answer: C
Question #62

Which of the following resources belongs to the quota resources allocated to the virtual system?

  • A . Number of strategies
  • B . VLAN
  • C . Interface
  • D . Safe area

Reveal Solution Hide Solution

Correct Answer: D
Question #63

Which of the following descriptions about bandwidth resource allocation is incorrect?

  • A . Which type of bandwidth resource limits a data flow is subject to depends on the outgoing interface or incoming interface of the traffic.
  • B . The public network interface refers to the interface connecting to the Internet
  • C . Bandwidth resources in the resource category are divided into three categories: inbound bandwidth, outbound bandwidth and overall bandwidth.
  • D . In the cross-virtual system forwarding scenario, the Virtual-if interface defaults to the public network interface.

Reveal Solution Hide Solution

Correct Answer: B
Question #64

When a visitor comes to the enterprise, while facilitating visitor access, it is necessary to control the visitor’s access behavior.

For this kind of visitor scenario, which of the following authentication methods is generally recommended?

  • A . MAC bypass authentication
  • B . Portal authentication
  • C . 802.1X authentication
  • D . MAC authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #65

Which of the following descriptions of the RADIUS and HWTACACS protocols is incorrect?

  • A . All use shared keys to encrypt transmitted user information
  • B . Both have good flexibility and scalability
  • C . The structure adopts client/server model.
  • D . All support the authorization of configuration commands on the device.

Reveal Solution Hide Solution

Correct Answer: D
Question #66

Which of the following descriptions about Portal authentication is incorrect?

  • A . Portal authentication can be triggered in two ways: active authentication and passive authentication. Active authentication is initiated by the client, and passive authentication is initiated by the authentication server.
  • B . Under normal circumstances, the client does not need to install additional software and authenticates directly on the Web page, which is simple and convenient.
  • C . The Portal server can be an independent entity outside the access device (external Portal server), or it can be an embedded entity that exists within the access device (built-in Portal server)
  • D . The Portal authentication system mainly includes four basic elements, client, access device, Portal server and authentication server

Reveal Solution Hide Solution

Correct Answer: A
Question #67

Among the following descriptions of IPS signature types, which signature type has the highest action priority?

  • A . Exception signature
  • B . Custom signature
  • C . Predefined signature
  • D . Signature filter

Reveal Solution Hide Solution

Correct Answer: A
Question #68

In the URL filtering process, which of the following actions is performed as the first step?

  • A . Detect HTTP message anomalies
  • B . Match black and white lists
  • C . Remote query
  • D . Match URL classification

Reveal Solution Hide Solution

Correct Answer: A
Question #69

Which of the following attacks does not expose network topology information?

  • A . Tracert message attack
  • B . Attacker side of IP packets with routing record entries
  • C . Scanning attack
  • D . Teardrop

Reveal Solution Hide Solution

Correct Answer: D
Question #70

Which of the following descriptions of the ATIC system architecture is incorrect?

  • A . ATIC software consists of three parts: management server, collector and controller
  • B . A management center can centrally manage multiple detection and cleaning equipment distributed in multiple regions.
  • C . Seco Manager uses B/S architecture as the management center
  • D . ATIC management server mainly manages detection and cleaning center equipment

Reveal Solution Hide Solution

Correct Answer: A

Question #71

Which of the following descriptions of Web Link in web proxy is incorrect?

  • A . There is a page compatibility issue, and images may be misaligned.
  • B . The URL will not be rewritten, which will expose the real address of the intranet server.
  • C . There are certain security risks
  • D . Depends on IE controls and cannot be used normally in non-IE environments

Reveal Solution Hide Solution

Correct Answer: A
Question #72

Which of the following descriptions of smart DNS is incorrect?

  • A . By configuring the smart DNS function, the firewall can intelligently modify the resolution address in the DNS response message so that the user can obtain the most appropriate resolution address, that is, an address that belongs to the same ISP network as the user.
  • B . Intelligent DNS supports weighted polling to achieve link load balancing
  • C . Smart DNS does not need to be combined with other technologies and can be used alone
  • D . Smart DNS is divided into two scenarios: single-server smart DNS and multi-server smart DNS.

Reveal Solution Hide Solution

Correct Answer: C
Question #73

Each bandwidth policy that references a bandwidth channel is independently constrained by the bandwidth channel, that is, traffic that meets the matching conditions of the bandwidth policy has exclusive access to the maximum bandwidth resource.

Which of the following options belongs to this bandwidth channel reference method?

  • A . Broadband sharing
  • B . Bandwidth multiplexing
  • C . Broadband exclusive
  • D . Dynamic equalization

Reveal Solution Hide Solution

Correct Answer: C
Question #74

Which of the following descriptions about dual-machine hot standby is incorrect?

  • A . In a load-sharing network, the configuration command can be backed up from "Configure Standby Device" to "Configure Primary Device"
  • B . In an active-standby backup network, configuration commands and status information are backed up from the active device to the standby device.
  • C . In load-sharing mode networking, traffic is processed by two devices, which can bear greater peak traffic than active-standby backup mode or mirroring mode networking.
  • D . In a load-sharing network, both firewalls are active devices. Therefore, if the two active devices are allowed to back up each other’s commands, it may cause the problems of mutual overwriting or conflict between the commands of the two devices.

Reveal Solution Hide Solution

Correct Answer: A
Question #75

As shown in the figure, the primary and secondary backup networking based on VRRP is wrong. In the following description of this scenario, which one is wrong?

  • A . In order to ensure the consistency of link switching, the firewall implements device status management based on VGMP groups.
  • B . The configuration and status information of firewall A is backed up to firewall B in real time through the GE0/0/3 interface.
  • C . Dual-machine hot backup can improve network reliability
  • D . The firewall GE0/0/1 interface is the heartbeat interface, and the connected line is the heartbeat line.

Reveal Solution Hide Solution

Correct Answer: B
Question #76

In which of the following access authentication methods, the terminal must obtain an IP address before authentication?

  • A . 802.1×Authentication
  • B . Portal
  • C . MAC authentication
  • D . MAC bypass authentication

Reveal Solution Hide Solution

Correct Answer: B
Question #77

In Huawei’s admission control solution, after the access device receives the CoA-Roquest message or DM-Requst message from the RADTUS server, which RADIUS attribute in the message is used to identify the user?

  • A . called-Station-ld
  • B . Filter-ld
  • C . NAS-IP-Address
  • D . calling-Station-ld

Reveal Solution Hide Solution

Correct Answer: C
Question #78

In the 802.1X authentication scenario, the access device directly encapsulates the EAPoL packet sent by the 802.1X client into a RADIUS packet, without processing the data in the EAP.

Which of the following authentication methods meets the above description?

  • A . EAP termination
  • B . MAC-based authentication
  • C . Interface-based authentication
  • D . EAP relay

Reveal Solution Hide Solution

Correct Answer: D
Question #79

Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring and adopts a modular scoring system. Which of the following does not include?

  • A . Environmental dimension
  • B . Time dimension
  • C . Basic dimensions
  • D . Spatial dimensions

Reveal Solution Hide Solution

Correct Answer: D
Question #80

Malicious URLs refer to URLs that contain malicious information. Which of the following is not the source of malicious URLs?

  • A . Malicious URLs reported by the sandbox
  • B . Malicious URLs reported by the intrusion prevention function
  • C . URLs included in local reputation
  • D . Malicious URLs reported by the anti-virus function

Reveal Solution Hide Solution

Correct Answer: B

Question #81

As shown in the figure, which one of the following descriptions of dual-machine hot standby based on transparent mode is incorrect?

  • A . Since the service interface of the firewall works on the second layer, it cannot run services related to IP addresses.
  • B . In this network, the firewall is transparently connected to the original switch network without changing the network topology.
  • C . It is recommended that this network work in load sharing mode to share user traffic
  • D . By default, the status of any VLAN will not be adjusted based on the VGMP group status.

Reveal Solution Hide Solution

Correct Answer: C
Question #82

Which of the following descriptions about the characteristics of Eth-Trunk is incorrect?

  • A . Eth-Trunk can be a Layer 2 interface or a Layer 3 interface.
  • B . Eth-Trunk is a logical interface
  • C . There are at least 2 Eth-Trunk member links
  • D . There is at least 1 active Eth-Trunk link

Reveal Solution Hide Solution

Correct Answer: C
Question #83

Which of the following descriptions of virtual interfaces is incorrect?

  • A . Mutual access between virtual systems is achieved through virtual interfaces
  • B . The link layer and protocol layer of the virtual interface are always UP
  • C . The virtual interface of the root system is Virtual-if1
  • D . The format of the virtual interface is "Virtual-if+interface number"

Reveal Solution Hide Solution

Correct Answer: C
Question #84

Which of the following descriptions about the restrictions on the use of virtual systems is incorrect?

  • A . As long as the system software is upgraded in the root system
  • B . If the interface has been configured with an IP address, it will be cleared when assigned to a virtual
  • C . Management ports cannot be assigned to virtual systems
  • D . The virtual system administrator can log in to the device through the Console port.

Reveal Solution Hide Solution

Correct Answer: D
Question #85

When IPSec uses certificate authentication, it is necessary to verify the legitimacy of the peer certificate. Which of the following is not a factor that needs to be considered to verify the legitimacy of the certificate?

  • A . Whether the certificate is applied for in the same way
  • B . Whether the certificate is within the validity period
  • C . Whether the certificate is located in the CRL repository
  • D . Whether the certificate is issued by the same CA

Reveal Solution Hide Solution

Correct Answer: D
Question #86

As shown in the figure, IPSec tunnels are established between the headquarters and branches. To achieve IPSec traffic load sharing, at least how many IPSec tunnels need to be established?

  • A . 1
  • B . 2
  • C . 4
  • D . 3

Reveal Solution Hide Solution

Correct Answer: C
Question #87

An enterprise has multiple branches. The exit IP address of the headquarters is fixed, but the exit IP addresses of the branches are random. An IPSec VPN needs to be established between the headquarters and branches. In order to reduce management and maintenance costs, which of the following is appropriate? How to configure IPSec VPN?

  • A . Headquarters and branches adopt a point-to-point approach
  • B . Both the headquarters and branches adopt the strategic model approach
  • C . The headquarters adopts the policy template method, and the branches adopt the point-to-point method.
  • D . The headquarters and branches adopt IKE v2 method

Reveal Solution Hide Solution

Correct Answer: C
Question #88

Which of the following descriptions about HTTP Flood defense is incorrect?

  • A . If the free proxy used during the attack supports the redirection function, the basic mode defense will be ineffective.
  • B . The source authentication defense method is to defend against HTTP
  • C . Defense based on enhanced mode can determine whether the TTP access is initiated by a real user by asking the user to enter a verification code.
  • D . Defense based on basic mode cannot effectively prevent access from non-browser clients

Reveal Solution Hide Solution

Correct Answer: D
Question #89

Which of the following descriptions of cleaning centers is incorrect?

  • A . Back-injection methods include: policy routing back-injection, static route back-injection, VPN back-injection and Layer 2 back-injection.
  • B . The cleaning device supports rich and flexible attack prevention technologies, but cannot defend against CC attacks and ICMP Flood attacks.
  • C . There are two methods of traffic diversion: static traffic diversion and dynamic traffic diversion.
  • D . The cleaning center completes functions such as diversion and cleaning of abnormal traffic, and reinjection of cleaned traffic.

Reveal Solution Hide Solution

Correct Answer: B
Question #90

When a firewall performs email filtering, which of the following email transfer protocols does it support?

  • A . SMTPS
  • B . SMTP
  • C . P0P3
  • D . IMAP

Reveal Solution Hide Solution

Correct Answer: A

Question #91

IPS devices work based on specific intrusion prevention mechanisms. Which of the following is the correct ranking of intrusion prevention mechanisms?

  • A . Feature matching->Reorganize application data->Protocol identification and protocol parsing->Response processing
  • B . Reorganize application data->Protocol identification and protocol parsing->Feature matching->Response processing
  • C . Reorganize application data->Feature matching->Protocol identification and protocol parsing->Response processing
  • D . Protocol identification and protocol parsing->Reorganize application data->Feature matching->Response processing

Reveal Solution Hide Solution

Correct Answer: B
Question #92

When using iMaster NCE-Campus as the Portal server, in order to allow iMaster NCE-Campus to match the corresponding Portal page according to the user’s IP address.

When configuring the URL template on the access device, which of the following URL parameters need to be configured?

  • A . ssid
  • B . device-mac
  • C . user-mac
  • D . user-ipaddress

Reveal Solution Hide Solution

Correct Answer: D
Question #93

To implement the access control function through Huawei iMaster NCE-Campus controller, which of the following is not required for authentication and authorization configuration?

  • A . Certification results
  • B . Authorization results
  • C . Certification rules
  • D . Authorization rules

Reveal Solution Hide Solution

Correct Answer: C
Question #94

Which of the following descriptions about 802.1× authentication is incorrect?

  • A . In EAP termination mode, EAP messages are directly encapsulated into RADIUS
  • B . The 802.1X authentication method is divided into EAP relay method and EAP termination method. In comparison, EAP relay method supports more authentication methods.
  • C . The 802.1X authentication system uses the EAP protocol to realize information exchange between the client, device and authentication server.
  • D . In the 802.1X authentication method, the client must support the 802.1x protocol.

Reveal Solution Hide Solution

Correct Answer: D
Question #95

Which of the following is not a function of the Anti-DDoS Management Center?

  • A . Performance management
  • B . Strategic Management
  • C . Alarm management
  • D . Traffic detection

Reveal Solution Hide Solution

Correct Answer: D
Question #96

Which of the following descriptions of the network expansion process in SSL VPN is incorrect?

  • A . The remote user’s local PC will automatically generate a virtual network card. The virtual gateway randomly selects an IP address from the address pool and assigns it to the remote user’s virtual network card.
  • B . The remote user sends a service request message to the server on the enterprise intranet, and the message reaches the virtual gateway through the SSL VPN tunnel.
  • C . In reliable transmission mode, SSL VPN uses SSL protocol to encapsulate messages and uses UDP protocol as the transmission protocol
  • D . After the network expansion function is triggered, an SSL VPN tunnel needs to be established between the remote user and the virtual gateway first.

Reveal Solution Hide Solution

Correct Answer: C
Question #97

Use IKE v1 main mode to establish an IPSec VPN. After detecting the presence of a NAT device, which of the following ISAKMP messages will be followed by port number conversion?

  • A . Message 5
  • B . Message 6
  • C . Message 3
  • D . Message 4

Reveal Solution Hide Solution

Correct Answer: A
Question #98

As shown in the figure, enterprise A and enterprise B need to communicate securely, and an IPSec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the needs of this scenario?

  • A . AH, tunnel mode
  • B . ESP, tunnel mode
  • C . ESP, transmission mode
  • D . AH+ESP, transmission mode

Reveal Solution Hide Solution

Correct Answer: B
Question #99

The network architecture of an enterprise is as shown in the figure below. Portal authentication is deployed on SW2. Its authentication-free template is as shown in the figure. Which of the following descriptions is correct?

  • A . At this time, the terminal can open the authentication interface.
  • B . At this time, the terminal can ping its own gateway.
  • C . At this time, the terminal can perform DNS resolution normally.
  • D . At this time, the terminal can be redirected to the authentication interface by entering the URL in the browser.

Reveal Solution Hide Solution

Correct Answer: B
Question #100

Which of the following descriptions about virtual system resource allocation is incorrect?

  • A . Unreasonable resource allocation may cause other virtual systems to be unable to obtain resources and the business to be unable to operate normally.
  • B . Quota resources automatically allocate a fixed number of resources directly according to system specifications.
  • C . When the administrator manually allocates resources to the virtual system, he first needs to configure the C resource class and specify the guaranteed value and maximum value of each resource item in the resource class, and then bind the source class to the virtual system
  • D . Each virtual system can share and seize the entire machine resources, but they can be allocated manually.

Reveal Solution Hide Solution

Correct Answer: D

Question #101

Which of the following descriptions of BFD detection characteristics is incorrect?

  • A . Reduce application interruption time and improve network reliability
  • B . Establish a session between the two devices to monitor the bidirectional forwarding path
  • C . Provide a detection time of less than 1 second to speed up network convergence
  • D . Fault detection can only be performed on the bidirectional forwarding path of the directly connected physical link between network devices.

Reveal Solution Hide Solution

Correct Answer: D
Question #102

The figure shows the defense principle of HTTP Flood. Which source detection technology is shown in the figure?

  • A . 302 redirect mode
  • B . Basic mode
  • C . URI monitoring
  • D . Enhanced mode

Reveal Solution Hide Solution

Correct Answer: D
Question #103

Which of the following descriptions of abnormal file type identification results is incorrect?

  • A . The file type cannot be recognized means that the file type cannot be recognized and there is no file extension.
  • B . Unrecognized file type means that neither the file type nor the file extension can be recognized.
  • C . File extension mismatch means that the file type and file extension are inconsistent.
  • D . File corruption refers to the inability to identify the file type due to the file being damaged.

Reveal Solution Hide Solution

Correct Answer: B
Question #104

To check whether there is an abnormal task plan (not set by the user) on the Linux host, which of the following commands can be used?

  • A . crontab -u mysql
  • B . crontab -e
  • C . crontab -r
  • D . crontab -l

Reveal Solution Hide Solution

Correct Answer: D
Question #105

According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be initiated?

  • A . First level response
  • B . Secondary response
  • C . Special response
  • D . Level 3 response

Reveal Solution Hide Solution

Correct Answer: A
Question #105

According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be initiated?

  • A . First level response
  • B . Secondary response
  • C . Special response
  • D . Level 3 response

Reveal Solution Hide Solution

Correct Answer: A
Question #105

According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be initiated?

  • A . First level response
  • B . Secondary response
  • C . Special response
  • D . Level 3 response

Reveal Solution Hide Solution

Correct Answer: A
Question #105

According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be initiated?

  • A . First level response
  • B . Secondary response
  • C . Special response
  • D . Level 3 response

Reveal Solution Hide Solution

Correct Answer: A
Question #105

According to the provisions of the "National Cyber Security Incident Emergency Plan", when national secret information, important sensitive information and relevant educational records are lost or stolen, tampered with or counterfeited, and pose a particularly serious threat to national security and social stability Which level of emergency response should be initiated?

  • A . First level response
  • B . Secondary response
  • C . Special response
  • D . Level 3 response

Reveal Solution Hide Solution

Correct Answer: A
Question #110

System starts traffic statistics

  • A . 3-4-2-1
  • B . 4-2-3-1
  • C . 2-4-3-1
  • D . 4-3-2-1

Reveal Solution Hide Solution

Correct Answer: A

Question #111

The "Stuxnet" virus is a worm that attacks industrial control systems.

Which of the following is the correct ranking of the Stuxnet virus attack process?

  • A . Reconnaissance of organizational structure and personnel information->Social engineering penetration->Looking for infection targets->Using USB flash drives for lateral spread->Launching attacks
  • B . Find infection targets -> Reconnaissance of organizational structure and personnel information -> Social engineering penetration -> Use USB flash drives to spread horizontally -> Launch attacks
  • C . Reconnaissance of organizational structure and personnel information->Social engineering penetration->Use USB flash drives to spread horizontally->Find infection targets->Launch attacks
  • D . Social engineering penetration -> Reconnaissance of organizational structure and personnel information -> Use USB flash drives to spread horizontally -> Find infection targets -> Launch attacks

Reveal Solution Hide Solution

Correct Answer: C
Question #112

On a Linux host, which of the following files can be viewed to count all user names and login methods in the current system?

  • A . /etc/passwd
  • B . /etc/profile
  • C . /etc/shadow
  • D . /etc/rc.local

Reveal Solution Hide Solution

Correct Answer: A
Exit mobile version