<< Prev Question Next Question >>

Question 67/138

When the firewall upgrades the signature database and virus database online through the security service center, the firewall must first be able to connect to the Internet, and secondly, the correct DNS address must be configured.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (138q)
Question 1: Security policy conditions can be divided into multiple fiel...
Question 2: According to the requirements of level protection, which of ...
Question 3: Regarding the problem that users with two-way binding in aut...
Question 4: Encryption technology can convert readable information into ...
Question 5: Which of the following are the response actions after the ga...
Question 6: "Implementing security monitoring management for information...
Question 7: On Huawei USG series firewalls, the default security policy ...
Question 8: Digital certificate technology solves the problem that the o...
Question 9: Regarding IKE SA, which of the following descriptions is wro...
Question 10: Which of the following data does the digital signature techn...
Question 11: IPS (Intrusion Prevention System) is a defense system that c...
Question 12: When the administrator upgrades the USG firewall software ve...
Question 13: Which of the following is the basic function of anti-virus s...
Question 14: Which of the following options belongs to the Layer 2 VPN te...
Question 15: Which of the following options belong to the certification f...
Question 16: The firewall imports users locally, and supports importing u...
Question 17: Regarding the investigation and evidence collection, which o...
Question 18: Security technology has different methods in different techn...
Question 19: In the Linux system, if the user wants to enter the tmp fold...
Question 20: Which of the following options belong to international organ...
Question 21: In order to obtain criminal evidence, it is necessary to mas...
Question 22: In the future development trend of information security, ter...
Question 23: Regarding the NAT policy processing, which of the following ...
Question 24: Please match the following malicious code classification and...
Question 25: For data communication between the two communicating parties...
Question 26: Which of the following factors are related to the initial pr...
Question 27: Regarding the source of electronic evidence, which of the fo...
Question 28: Regarding the description of the operating system, which of ...
Question 29: Which of the following about the difference between pre-acci...
Question 30: When using the ______ function of SSL VPN, the virtual gatew...
Question 31: Regarding single sign on, which of the following statements ...
Question 32: HTTP packets are carried by UDP, and the HTTPS protocol is b...
Question 33: When configuring the security policy, ______ can control the...
Question 34: Which item stipulates that "spam should be detected and prot...
Question 35: Which of the following is the default backup mode of dual-ma...
Question 36: Want to implement "anti-virus function" in the security poli...
Question 37: Digital envelope refers to the data obtained after the sende...
Question 38: Regarding the description of the authentication of Internet ...
Question 39: According to the management regulations, regular inspections...
Question 40: Which of the following are multi-user operating systems? (Mu...
Question 41: Which of the following is not included in the trigger authen...
Question 42: Please order the following digital envelope encryption and d...
Question 43: Which of the following options can be operated in the advanc...
Question 44: Which of the following descriptions of the VGMP protocol is ...
Question 45: Which of the following options belong to the characteristics...
Question 46: In order to obtain criminal evidence, it is necessary to mas...
Question 47: Which of the following are necessary for firewall dual-machi...
Question 48: In addition to supporting built-in Portal authentication, fi...
Question 49: Regarding IPSec SA, which of the following statements is cor...
Question 50: The reason why OSPF is more commonly used than RIP is that O...
Question 51: Regarding the description of the advanced settings of the wi...
Question 52: In the _______ view of the firewall, you can use the reboot ...
Question 53: Which of the following options does not belong to the log ty...
Question 54: Using a computer to store information about criminal activit...
Question 55: Regarding the description of the buffer overflow attack, whi...
Question 56: Which of the following options are included in the encryptio...
Question 57: Network administrators can collect data that needs to be ana...
Question 58: Please match the following information security risks with i...
Question 59: After the company ' s network administrator has configured d...
Question 60: Which types can be divided into according to the shape of se...
Question 61: Which of the following options is not included in the consis...
Question 62: In the IPSec VPN transmission mode, which part of the data m...
Question 63: NAPT technology can implement a public IP address for multip...
Question 64: Which of the following is the action to be taken in the summ...
Question 65: When an enterprise establishes its own information system, i...
Question 66: In the classification of the information security level prot...
Question 67: When the firewall upgrades the signature database and virus ...
Question 68: Which of the following options does not belong to the five-t...
Question 69: Which configuration below can implement NAT ALG function?...
Question 70: Which of the following is the encryption technology used in ...
Question 71: About AH and ESP security protocols, which of the following ...
Question 72: Which of the following attacks is not a network attack?...
Question 73: Regarding the firewall security zone, which of the following...
Question 74: Which of the following is not a major form of computer crime...
Question 75: Regarding port mirroring, which of the following description...
Question 76: Regarding GRE encapsulation and decapsulation, which of the ...
Question 77: What versions of the SNMP protocol are there? (Multiple choi...
Question 78: Which of the following options are malicious programs? (Mult...
Question 79: Which of the following statement is wrong about the L2TP VPN...
Question 80: _________ Mode: Two devices, one active and one standby. Und...
Question 81: The single sign-on function of Internet users, the user dire...
Question 82: Digital signature is to generate a digital fingerprint by us...
Question 83: About the description of the Windows firewall, which of the ...
Question 84: In the digital signature process, which of the following ite...
Question 85: Regarding the sequence of call establishment procedures for ...
Question 86: In the USG series firewall, you can use the ______ function ...
Question 87: Data Analysis Technology is to find, match keywords or key p...
Question 88: Security policy conditions can be divided into multiple fiel...
Question 89: When the firewall hard disk is on the throne, which of the f...
Question 90: Which of the following is a remote authentication method? (M...
Question 91: Which of the following types of attacks are DDos attacks?...
Question 92: Please classify the following servers and their functions co...
Question 93: Regarding the actions of the security policy and the descrip...
Question 94: In the Huawei SDSec solution, which of the following belong ...
Question 95: Regarding the online user management, which of the following...
Question 96: Regarding the matching conditions of the security policy, wh...
Question 97: On the USG series firewall, after configuring the web redire...
Question 98: According to the HiS ec solution, please drag the devices on...
Question 99: IPSec VPN uses an asymmetric encryption algorithm to encrypt...
Question 100: Which item is correct about SSL VPN?...
Question 101: Clients in the Trust zone of the firewall can log in to the ...
Question 102: Security technology has different methods in different techn...
Question 103: Please match the whole worm virus attack process and attack ...
Question 104: Both GE1/0/1 and GE1/0/2 ports of the firewall belong to the...
Question 105: Regarding the business continuity plan, which of the followi...
Question 106: Which of the following is not a file format for saving certi...
Question 107: Which of the following attacks is not a malformed message at...
Question 108: When the USG series firewall hard disk is in place, which of...
Question 109: NAT technology can realize data secure transmission by encry...
Question 110: The matching principle of the security policy is: first sear...
Question 111: 1. The enterprise needs to have its own dedicated mailbox, a...
Question 112: If internal employees access the Internet through a firewall...
Question 113: Which of the following is not asymmetric encryption algorith...
Question 114: About SSL VPN technology, which of the following statement i...
Question 115: User authentication is the authentication of the client's id...
Question 116: About the description of the vulnerability scan, which of th...
Question 117: In the construction of an information security system, a sec...
Question 118: Huawei's Agile-Controller product is a _____ device in the H...
Question 119: When one of the following situations occurs in the VGMP grou...
Question 120: Which of the following are not common application scenarios ...
Question 121: "Caesar Password" is mainly encrypted by using a stick of sp...
Question 122: Regarding NAT address conversion, which of the following sta...
Question 123: Drag the stages of cybersecurity emergency response on the l...
Question 124: In the user management of Huawei firewall, which of the foll...
Question 125: Which of the following SSL VPN functions can only access all...
Question 126: In the PKI system architecture, _______ is the CA's window t...
Question 127: When connecting to Wi-Fi in public places, which of the foll...
Question 128: Regarding the description of the ARP spoofing attack, which ...
Question 129: In the process of using the digital envelope, which of the f...
Question 130: Which of the following VPNs cannot be used in Site to-Site s...
Question 131: RFC (Request For Comment) 1918 sets aside 3 IP address ends ...
Question 132: Which of the following is not a stand-alone anti-virus techn...
Question 133: Which of the following is the port number used by L2TP packe...
Question 134: Which of the following is not the default security zone of t...
Question 135: Regarding the description of the preemption function managed...
Question 136: Regarding the firewall security strategy, which of the follo...
Question 137: "Be good at observation" and "keep suspicion" can help us be...
Question 138: IPSec VPN uses an asymmetric algorithm to calculate the ____...