Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

A.

True

B.

False

Full Access
Question # 5

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.

Wired access

B.

Wireless access

C.

VPN Access

D.

802.1X Access

Full Access
Question # 6

Configure the following commands on the Huawei firewall:

[USG] interface G0/0/1

[USG] ip urpf loose allow-defult-route acl 3000

Which of the following options are correct? (multiple choice)

A.

For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly

B.

For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall

If it does not exist, the message will be rejected.

C.

For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall

If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.

155955cc-666171a2-20fac832-0c042c0427

D.

For the configuration of the default route, and at the same time matching the parameter allow-defult-route, if the source address of the message is in the FIB table of the firewall

If it does not exist in the l0e check, the packet cannot pass the URPF check.

Full Access
Question # 7

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

A.

Enhanced mode refers to the authentication method using verification code.

B.

Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense

Effective, enhanced mode can effectively defend.

C.

The enhanced mode is superior to the basic mode in terms of user experience.

D.

Enhanced mode supports all HTTP Flood source authentication fields. "

WWQQ: 922333

Full Access
Question # 8

Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)

A.

You can check whether there is a weak password.

B.

You can check whether the account has joined a specific group.

C.

It cannot be repaired automatically._

D.

It is not possible to check whether the password length meets the requirements.

Full Access
Question # 9

Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.

A.

True

B.

False

Full Access
Question # 10

Which of the following options is wrong for the description of the cleaning center?

A.

The cleaning center completes the functions of drainage, cleaning, and re-injection of the flow after cleaning in the abnormal flow.

B.

There are two types of drainage methods: static drainage and dynamic drainage.

C.

Re-injection methods include: policy route re-injection, static route re-injection, VVPN back-injection and layer 2 same.

D.

The cleaning equipment supports rich and flexible attack prevention technologies, but it is ineffective against cc attacks and ICMP Flood attacks.

Full Access
Question # 11

The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.

A.

True

B.

False

Full Access
Question # 12

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

A.

DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,

155955cc-666171a2-20fac832-0c042c047

B.

DF bit is 023, MF bit is 1 or Fragment Offset is not 0,

C.

DF bit is 0, and Fragment Offset + Length> 65535.

D.

The DF bit is 1, and Fragment Ofset + Length <65535.

Full Access
Question # 13

Regarding uninstalling the Agile Controller-Campus in Windows and Linux systems, which of the following descriptions is correct?

A.

Use a common account to execute sh uninstall.sh in the Agile Controller/Uninstall directory to start the uninstallation program.

B.

Use the root account to execute sh uninstall.sh in the Agile Controller directory to start the uninstallation program. :

C.

On the Windows platform, select "Start>All Programs>Huawei>Agile Controller>Server Startup config".

D.

On the Windows platform, select "Start>All Programs> Huawei> Agile Controller>Uninstall

Full Access
Question # 14

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

A.

The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source

B.

For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify

The legitimacy of the source IP.

C.

In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process

It will consume the TCP connection resources of the OINS cache server.

D.

Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Full Access
Question # 15

Regarding the file source set in the software management, which of the following descriptions is correct?

A.

When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

Full Access
Question # 16

Visitor management can authorize visitors based on their account number, time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.

A.

True

B.

False

Full Access
Question # 17

Web Standards that come with the client and operating system 8021 The instrument client only has the function of identity authentication: It does not support the execution of inspection strategies and monitoring strategies. Any Office The client supports all inspection strategies and monitoring strategies.

A.

True

B.

False

Full Access
Question # 18

Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.

A.

True

B.

False

Full Access
Question # 19

Regarding the sequence of the mail transmission process, which of the following is correct?

1. The sender PC sends the mail to the designated SMTP Server.

2. The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail

3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver

4. The recipient sends an email.

A.

1->2->3

B.

1->2->4,

C.

1->3->2

D.

1->4->3

Full Access
Question # 20

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

A.

MAC Certification

B.

Password authentication

C.

Not certified:

D.

SN Certification

Full Access
Question # 21

Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?

1. The Netflow analysis device samples the current network flow;

2. Send a drainage command to the cleaning center;

3. Discover the DDoS attack stream;

4.Netior: analysis equipment sends alarms to ATIC management center

5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;

6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage

7. The cleaning log is sent to the management center to generate a report;

8. The cleaned traffic is sent to the original destination server.

A.

1-3-4-2-5-6-7-8

B.

1-3-2-4-6-5-7-8

C.

1-3-4-2-6-5-8-7

D.

1-3-24-6-5-8-7

Full Access
Question # 22

Which of the following law items is the most blessed for safety? This should be true?

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00

B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.

C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.

D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

Full Access
Question # 23

BY00 The products and textiles provided by the history solution program cover the entire terminal network\Application and management and other fields/include: Serialization BC Equipment, paperless network system network access support, VPN Gateway, terminal security customer ladder software, authentication system, mobile device management(MDN),move eSpace UC.

A.

True

B.

False

Full Access
Question # 24

Regarding Huawei's anti-virus technology, which of the following statements is wrong?

A.

The virus detection system cannot directly detect compressed files

B.

The anti-virus engine can detect the file type through the file extension

C.

Gateway antivirus default file maximum decompression layer is 3 layers

D.

The implementation of gateway antivirus is based on proxy scanning and stream scanning

Full Access
Question # 25

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

A.

Straight forward to return authentication failure information.

B.

Discard user information.

C.

User 91 Information sent to AD The server performs verification.

D.

Synchronize the database again.

Full Access
Question # 26

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)

A.

Portal server IP

B.

Portal page URL

C.

shared-key

D.

Portal Protocol version

Full Access
Question # 27

Which of the following methods can be used to protect enterprise terminal security?

A.

Access control

B.

Encrypted access

C.

Business isolation

D.

Audit billing

Full Access
Question # 28

There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Address and MC The address serves as the information to identify the user.

A.

True

B.

False

Full Access
Question # 29

Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?

A.

display version av-sdb

B.

display utm av version

C.

display av utm version

D.

display utm version

Full Access
Question # 30

​​SQl injection attacks generally have the following steps:

①Elevate the right

②Get the data in the database

③Determine whether there are loopholes in the webpage

④ Determine the database type

For the ordering of these steps, which of the following options is correct?

A.

③④①②

B.

③④②①

C.

④①②③

D.

④②①③

Full Access
Question # 31

Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

A.

True

B.

False

Full Access
Question # 32

If the regular expression is "abc. de", which of the following will not match the regular expression?

A.

abcde

B.

abcdde

C.

abclde

D.

abc+de

Full Access
Question # 33

Which of the following options is not included in the mobile terminal life cycle?

A.

Obtain

B.

deploy

C.

run

D.

Uninstall

Full Access
Question # 34

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.

Discard message

B.

URL Address redirected to Portal Authentication page

C.

Direct travel

D.

Send authentication information to authentication server

Full Access
Question # 35

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.

B.

SACG The linkage with the controller is successful.

C.

main controller IP address is 1.1.1.2.

D.

main controller IP address is 2.1.1.1.

Full Access
Question # 36

User access authentication technology does not include which of the following options?

A.

Authentication

B.

Isolation repair'

C.

Security check

D.

Access control

Full Access
Question # 37

Agile Controller-Campus All components are supported Windows System and Linux system.

A.

True

B.

False

Full Access
Question # 38

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system

If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)

A.

Host

B.

A group of users

C.

Single user

D.

A key program and file in the system

Full Access
Question # 39

Which of the following options is about SACG The description of the online process is wrong?

A.

Terminal and Agile Controller-Campus Server communication SSL encryption

B.

Authentication fails, end users can only access resources in the pre-authentication domain

C.

Security check passed,Agile Controller-Campus Server notification SACG Will end user's IP Address switch to isolated domain

D.

Agile Controller-Campus Server gives SACG Carrying domain parameters in the message

Full Access
Question # 40

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

A.

Short message

B.

E-mail

C.

Web Print

D.

Voicemail

Full Access
Question # 41

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

A.

The access layer switch does not start EAP Transparent transmission function.

B.

wireless 02K In the scenario, the access control device is not equipped with a security board

C.

AD The service controller is not added in the authentication scenario AD area.

D.

The user account or password is incorrectly configured.

Full Access
Question # 42

When a virus is detected in an email, which of the following is not the corresponding action for detection?

A.

Warning

B.

Block

C.

Declare

D.

Delete attachments

Full Access
Question # 43

Which of the following threats cannot be detected by IPS?

A.

Virus

B.

Worms

C.

Spam

D.

DoS

Full Access
Question # 44

Regarding the strategy for checking the screensaver settings, which of the following descriptions are correct? (Multiple choice)

A.

You can check whether the screen saver is enabled on the terminal

B.

You can check whether the screen saver password is enabled

C.

Only supports Windows operating system

D.

Screen saver settings cannot be automatically repaired

Full Access
Question # 45

The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.

A.

True

B.

False

Full Access
Question # 46

Agile Controller-Campus The product architecture includes three levels. Which of the following options does not belong to the product architecture level?

A.

Server layer

B.

Network device layer

C.

Access control layer

D.

User access layer

Full Access
Question # 47

In order to protect the security of data transmission, more and more websites or companies choose to use SSL to encrypt transmissions in the stream. About using Huawei NIP6000

The product performs threat detection on (SSL stream boy, which of the following statements is correct?

A.

NIP0OO does not support SSL Threat Detection.

B.

The traffic after threat detection is sent directly to the server without encryption

C.

NIP can directly crack and detect SSL encryption.

D.

After the process of "decryption", "threat detection", and "encryption"

Full Access
Question # 48

Agile Controller-Campus The department includes four parts of the management center(MC)Business manager(SM)And business controller(SC)And client network access equipment (NAD)As a component of the solution, it is linked with the service controller to realize user access control and free mobility.

A.

True

B.

False

Full Access
Question # 49

Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)

A.

Virtual patch

B.

Mail detection

C.

SSL traffic detection

D.

Application identification and control

Full Access
Question # 50

Which of the following is the default port number of Portal authentication service?

A.

1812

B.

1813

C.

50200

D.

50300

Full Access
Question # 51

Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?

A.

Resource pool mechanism

B.

weighting mechanism

C.

load balancing

D.

Hot Standby

Full Access
Question # 52

The status code in the HTTP response message indicates the type of the response message, and there are many possible values. Which of the following status codes represents the client request

The resource does not exist?

A.

400.

B.

404

C.

200

D.

503

Full Access
Question # 53

Which of the following options is not a cyber security threat caused by weak personal security awareness?

A.

Disclosure of personal information

B.

Threats to the internal network

C.

Leaking corporate information

D.

Increasing the cost of enterprise network operation and maintenance

Full Access
Question # 54

If you are deploying BYOD When the system is installed, use a stand-alone installation SM, Dual-machine installation SC, Stand-alone hardware deployment AE,Which of the following descriptions are correct? (Multiple choice)

A.

AE Server priority use)SC server.

B.

Install AE When the server, you need to configure the main and standby SC Server IP address.

C.

If the Lord SC After the server fails,AE The server will use the backup SC server.

D.

host SC After the server is restored,AE Server will not switch back to master SC The server handles the business.

Full Access
Question # 55

In centralized networking, database,SM server,SC server\ AE Servers are centrally installed in the corporate headquarters. This networking method is suitable for companies with a wide geographical distribution of users and a large number of users.

A.

True

B.

False

Full Access