HCIE-Security (Written) V2.0 Questions and Answers
Which services in HUAWEI CLOUD solutions can data encryption be applied?
Which of the following services are security management services in HUAWEI CLOUD solutions?
Which of the following options does not reflect the advanced characteristics of APT attacks? (single selection).
in the architecture of software-defined security Which of the following feature descriptions is correct?
To implement private network user A to access the Internet network after user B That is, which of the following source NAT modes can be configured on the exit firewall to be actively accessed by other users in the Internet network?
Multi-factor authentication is mainly used in scenarios of login protection and operation protection.
The sandbox cannot link the anti-virus with which of the following devices, (single selection).
When the Abnormal Traffic Inspection & Control System^ defense strategy of the Abnormal Traffic Monitoring System ATIC selects the anti-uninstall action, it utilizes the status code (targeted) for which of the following options GET request method redirection) to prove the true identity of the client?
In accordance with the provisions of the National Cybersecurity Law... Private clouds need to comply with the basic requirements of classified information security protection, but do not necessarily need to comply with cloud computing scaling requirements.
Which of the following options is a pseudonymized method for data?
The SQL injection vulnerability occurs due to the lack of validation of the legitimacy of user input
The sandbox and the firewall link anti-virus After the sandbox detects the virus file, the next information is fed back to the firewall (radio selection).
In the following description of the principles of network trapping defense, which are correct? (multiple selection).
Which of the following authentication methods is password authentication? (single selection).
The purpose of access control is to provide access to authorized subjects and prevent any unauthorized and intentional access.
One of the reasons why traditional passive defense does not protect against APT attacks is that traditional defense methods cannot correlate and analyze threats.
Which of the following options are part of the Internet Behavior? (multiple selection).
In 2017, hackers unveiled a slew of cyberattack tools, including Eternal Blue tools. Then • Eternal Blue exploits the vulnerability of which of the following options of the Windows system can obtain the maximum relaxation limit of the system.
The following describes the service identification Which item ◊ (single selection) is wrong
The following describes the transparent proxy deployment features of WAF Which is correct? (multiple selection).
Which is the correct order for IPS to process traffic? (single selection).
Anonymization and pseudonymization of data While reducing the risk of data privacy leakage, it will also reduce the availability of data
The following describes vulnerabilities and identification and assessment Which one is incorrect? (single selection).
Common means of protecting against SYN Flood political attacks are link restriction techniques and link proxy techniques Among them, connection broker technology refers to the detection of TCP connection rate Set the check alarm value to send messages and block attack traffiC.
Which of the following is not part of the changing trend in cyberattacks? (Single selection)
The global nature of the Internet exposes Teb services to attacks of varying sizes, sizes, and sophistications So which of the following options can secure Web services?
Which of the following standard bills is relevant to security audits? (Multiple selection)
Huawei's network security intelligence system CIS can only be linked with which of the following devices to block viruses?
As a network administrator, if you want to understand the security events of web attacks by viewing the logs on the WAF. What kind of logs do I need to see? (single selection).
The server can set or read the information contained in the cookie This maintains state in the user's session with the server.
A5RUE
B. FALSE
Which of the following describes the business process of the network trapping scheme wrong? (single selection).
Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.
Which of the following options protects against SMRF attacks?
Digital certificates can ensure the credibility of the public key of the communicating partner in the process of data transmission.
Requirements for physical facilities in the computer room in Class Protection 2.0
Which of the following health check descriptions is correct? (Selection)
In the following description of IPv6 security features, which one is wrong? (single selection).
As IPv6 DNS and other related protocols are designed for security
B. IPv6 addresses can be generated by encryption However, privacy headers are not supported
C. AH, and ES can be used as extension headers for IPv6 IPsec is used for additional security.
D. The IPv6 address is 128 bits to ensure that the source address is trusted
Each element of the audit policy can be flexibly configured, which is convenient for users to classify, classify audit and response, so how many elements the audit strategy includes
The USG firewall is connected to the corporate intranet through a router After the firewall is configured with the cross-Layer 3 MAC identification feature, then the security policy of the firewall can configure the MAC address as a match condition o
In the WAF defense-in-depth system, which of the following security checks is used to protect against CC attacks? (single selection).
Determine the goal, 2 Intranet forwarding' 3 Intranet penetration, 4 Trace removal, 5 Information Collection, 6 Vulnerability detection, 7 Exploit vulnerabilities, 8 Write test reports. The following is the correct understanding of the penetration test process' (single selection).