HCIP-Security (Fast track) V1.0 Questions and Answers
SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)
Web Standards that come with the client and operating system 8021 The instrument client only has the function of identity authentication: It does not support the execution of inspection strategies and monitoring strategies. Any Office The client supports all inspection strategies and monitoring strategies.
Which of the following options is not included in the mobile terminal life cycle?
Which of the following options belongs to MC prioritized pail Authentication application scenarios?
With the continuous development of the network and the rapid development of applications, companies are making users more and more frequently start to transfer files on the network.
Virus threats are becoming more and more serious. Only by rejecting the virus outside the network can data security and system stability be guaranteed. So, which of the following are
What harm might be caused by illness? (multiple choices)
Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?
Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?
When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
Which of the following technologies can achieve content security? (multiple choice)
There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.
Regarding scanning and snooping attacks, which of the following descriptions is wrong?
Which of the following types of attacks are DDoS attacks? 2I
Which of the following attacks are attacks against web servers? (multiple choices)
View on the switch Agile Controller-Campus The policy issued by the server is as follows:
For this strategy, which of the following options are correct? (Multiple choice)
Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)
Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)
For the basic mode of HTTP Flood source authentication, which of the following options are correct? (multiple choice)
An account can only belong to one user group, that is, a user can only belong to one department.
Among the following options, which attack is a malformed packet attack based on the TCR protocol?
Use BGP protocol to achieve diversion, the configuration command is as follows
[sysname] route-policy 1 permit node 1
[sysname-route-policy] apply community no-advertise
[sysname-route-policy] quit
[sysname]bgp100
155955cc-666171a2-20fac832-0c042c04
29
[sysname-bgp] peer
[sysname-bgp] import-route unr
[sysname- bgpl ipv4-family unicast
[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export
[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community
[sysname-bgp-af-ipv4] quit
[sysname-bgp]quit
Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)
In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.
In enterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding the description of binding the terminal host and account, which of the following is correct?
Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?
Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device
Collect it in the log for continuous learning and optimization.
Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.
In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?
Which of the following options cannot be triggered MAC Certification?
A policy template is a collection of several policies. In order to audit the security status of different terminal hosts and the behavior of end users, the administrator needs to customize.
The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (multiple choice)
In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.
Which of the following descriptions about the black and white lists in spam filtering is wrong? c
Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.
The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?
Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)
The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping website during working hours. So a URL filtering configuration file is configured to divide the predefined
The shopping website in the category is selected as blocked. But employee A can still use the company's network to shop online during lunch break. Then what are the following possible reasons
some?
The status code in the HTTP response message indicates the type of the response message, and there are many possible values. Which of the following status codes represents the client request
The resource does not exist?
In the Agile Controller-Campus solution, which device is usually used as the hardware SACG?
Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.
According to the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.
There are three types. Which of the following formats is not included?
The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.
When the account is distributed to users, what stage does the distribution of the account belong to?
Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)
The processing flow of IPS has the following steps;
1. Reorganize application data
2. Match the signature
3. Message processing
4. Protocol identification
Which of the following is the correct order of the processing flow?
Regarding the processing process of file overwhelming, which of the following statements is correct?
In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)
SQI Server2005 may not be properly installed, which of the following may be the possible reasons?
File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.
Which of the following options is for Portal The description of the role of each role in the authentication system is correct?
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
Regarding the identity authentication method and authentication type, which of the following descriptions is correct?
Regarding HTTP behavior, which of the following statements is wrong?
Free mobility is a special access control method, according to the user’s access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user’s access conditions remain unchanged, the permissions and network experience after accessing the network--To q
Agile Controller-Campus All components are supported Windows System and Linux system.
Regarding the description of the logic architecture of the business accompanying, which of the following options is correct?
In centralized networking, database,SM server,SC server\ AE Servers are centrally installed in the corporate headquarters. This networking method is suitable for companies with a wide geographical distribution of users and a large number of users.
Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.
What is the working mode of AP? (multiple choice)
In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?
Which of the following options is not a feature of big data technology?