<< Prev Question Next Question >>

Question 151/249

Manual auditing is a supplement to tool evaluation, it does not require any software to be installed on the target system being evaluated, and has no impact on the operation and status of the target system. Which of the following options is not included in the content of a manual audit?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (249q)
Question 1: Please sort from large to small according to the table proce...
Question 2: Which of the following is the action to be taken in the erad...
Question 3: Which of the following options can be operated in the advanc...
Question 4: Which of the following options is not included aboutHRP in t...
Question 5: With the development of technology, some new technologies ha...
Question 6: The goal of ______ is to provide a quick, calm and effective...
Question 7: Both GE1/0/1 and GE1/0/2 ports of the firewall belong to the...
Question 8: What is the corresponding warning level for major network se...
Question 9: useiptablesWrite a rule that doesn't allow172.16.0.0/16Which...
Question 10: About firewall fragmentationWhich of the following options i...
Question 11: Using the _____ method of the web proxy, the virtual gateway...
Question 12: aboutVGMPDescription of the managed preemption function, whi...
Question 13: Which of the following isP2DRThe core part of the model?...
Question 14: One of the following options for information security manage...
Question 15: _____ Mode: Two devices, one master and one backup. Under no...
Question 16: Using the ___ method of the Web proxy, the virtual gateway w...
Question 17: Which of the following options is not a hash algorithm?...
Question 18: Which of the following is the user name/password for the fir...
Question 19: Which of the following descriptions about the main implement...
Question 20: IPSec VPNtechnology adoptionESPSecurity protocol encapsulati...
Question 21: According to different usage scenarios, digital certificates...
Question 22: Which of the following options belong to the default securit...
Question 23: Which of the following are the main implementation methods o...
Question 24: Regarding the description of IP Spoofing, which of the follo...
Question 25: To configure a NAT policy in command line mode, you need to ...
Question 26: Which of the following traffic matches the authentication po...
Question 27: existUSGIn the series firewalls, which of the following comm...
Question 28: The HRP (Huawei Redundancy Protocol) protocol is used to syn...
Question 29: If users from the external network (where the security zone ...
Question 30: _______ is a defect in the specific implementation of hardwa...
Question 31: An employee of a company accesses the internal web server of...
Question 32: Which of the following is the default backup mode of dual-ma...
Question 33: When connecting to Wi-Fi in public places, which of the foll...
Question 34: Which of the following options belong to the characteristics...
Question 35: Which of the following attacks is not a cyber attack?...
Question 36: IPSec VPN uses an asymmetric algorithm to calculate the ___ ...
Question 37: Which of the following options are the possible reasons for ...
Question 38: Which of the following statements about Internet user manage...
Question 39: When an enterprise establishes its own information system, i...
Question 40: Under normal circumstances, the Emai1 protocols we often tal...
Question 41: When configuring the security policy, ______ can control the...
Question 42: Regarding the comparison between windows and linux, which of...
Question 43: Which of the following descriptions about dual-system hot ba...
Question 44: Which of the following is used to encrypt digital fingerprin...
Question 45: The role of antivirus software and host firewall is the same...
Question 46: IPS (Intrusion Prevention System) is a defense system that c...
Question 47: RFC (Request For Comment) 1918 reserves 3 IP addresses for p...
Question 48: What are the correct options for the following description o...
Question 49: The SSL VPN routing mode determines the routing of the packe...
Question 50: Digital certificate technology solves the problem that the p...
Question 51: Which of the following is not a requirement for firewall dua...
Question 52: The attacker searches the ports currently open by the attack...
Question 53: Which of the following options are included in the encryptio...
Question 54: Which of the following is not a key technology of anti-virus...
Question 55: In anti-virus software, ( ) technology can analyze compresse...
Question 56: In practical applications, asymmetric encryption is mainly u...
Question 57: Which of the following attacks is not a network attack?...
Question 58: After the firewall uses the hrp standby config enable comman...
Question 59: aboutNATPolicy processing flow, which of the following optio...
Question 60: Which of the following is not asymmetric encryption algorith...
Question 61: In the _______ view of the firewall, you can use the reboot ...
Question 62: Which of the following statement is wrong about the root CA ...
Question 63: For the process of forwarding session header packets between...
Question 64: Which of the following protocols does not belong to the prot...
Question 65: After a network intrusion event occurs, according to the pla...
Question 66: When dual-system hot backup is deployed on the firewall,VRRP...
Question 67: When an information security incident occurs, the priority i...
Question 68: After the company ' s network administrator has configured d...
Question 69: Which of the following descriptions about dual-system hot ba...
Question 70: Which of the following protocols cannot be encrypted by SSL ...
Question 71: About the description of the Windows firewall, which of the ...
Question 72: Regarding Huawei routers and switches, which of the followin...
Question 73: Which of the following NAT technologies is a destination NAT...
Question 74: Match the following survey methods and descriptions one by o...
Question 75: When configuring user single sign-on, if the mode of queryin...
Question 76: In a stateful inspection firewall, when the stateful inspect...
Question 77: Which of the following is not the business scope of the Nati...
Question 78: In the construction of information security system, it is ne...
Question 79: Drag the early warning levels of the network security emerge...
Question 80: Security technology has different methods in different techn...
Question 81: Which of the following is not the business scope of the Nati...
Question 82: Which item below is not a Linux operating system?...
Question 83: Which of the following are multi-user operating systems? (Mu...
Question 84: In the classification of the information security level prot...
Question 85: Which of the following items belong to the information secur...
Question 86: Regarding the description of firewall dual-system hot backup...
Question 87: Evidence preservation is directly related to the legal effec...
Question 88: Manual audit is a supplement to tool assessment. It does not...
Question 89: Regarding the description of the operating system, which of ...
Question 90: When the FW is deployed at the network egress, if a fault oc...
Question 91: Which is the order of the four stages of the Information Sec...
Question 92: SNMPWhat versions of the protocol are there? (multiple choic...
Question 93: Which of the following descriptions about symmetric encrypti...
Question 94: After an engineer configures the NAT-Server, in order to che...
Question 95: Intrusion Prevention System (IPS,intrusion prevention system...
Question 96: Which of the following is true about the difference between ...
Question 97: In the digital signature process, which of the following ite...
Question 98: aboutwindowsFirewall description, which of the following opt...
Question 99: Compared with IPSec VPN, ( ) has the advantage of good compa...
Question 100: Gratuitous ARP can be used to detect if _____address conflic...
Question 101: About the description of the vulnerability scan, which of th...
Question 102: We should choose the encryption algorithm according to our o...
Question 103: Which of the following options is not part of the quintuple ...
Question 104: Regarding the source of electronic evidence, which of the fo...
Question 105: Which of the following is not a hash algorithm?...
Question 106: Which of the following options belong to the default securit...
Question 107: Which of the following statements about the PKI life cycle i...
Question 108: Which of the following is an encryption technique used in di...
Question 109: In the classification of information security classified pro...
Question 110: Regarding the matching conditions of the security policy, wh...
Question 111: The preservation of electronic evidence is directly related ...
Question 112: In the Linux system, if the user wants to enter the tmp fold...
Question 113: As shown in the figure is an application scenario of a NAT s...
Question 114: Social engineering is a means of harm such as deception, har...
Question 115: Based on the HiSec solution, please drag the device on the l...
Question 116: The trigger modes of the built-in Portal authentication in t...
Question 117: Write a rule with iptables that does not allow 172.16.0.0.0/...
Question 118: Digital envelope refers to the data obtained after the sende...
Question 119: Which of the following options is not a passive means of obt...
Question 120: IPSec VPN uses an asymmetric encryption algorithm to encrypt...
Question 121: According to the level protection requirements, which of the...
Question 122: which of the followingIPSec VPNnecessary configuration? (mul...
Question 123: _____ Authentication is to configure user information (inclu...
Question 124: Regarding the description of the buffer overflow attack, whi...
Question 125: VGMPIn which of the following situations occurs in the group...
Question 126: DDosWhich of the following attack types is an attack?...
Question 127: Network administrators can collect data that needs to be ana...
Question 128: Which of the following options are suitable for business tra...
Question 129: Which of the following security measures does the monitor co...
Question 130: Which of the following NAT technologies can implement a publ...
Question 131: some applications such asOracleFor database applications, th...
Question 132: Which of the following information is not the backup content...
Question 133: Which of the following about the difference between pre-acci...
Question 134: When using the ______ function of SSL VPN, the virtual gatew...
Question 135: If foreign criminals use the Internet to steal my country's ...
Question 136: Social engineering is a kind of harmful means such as decept...
Question 137: Which of the following is not part of a digital certificate?...
Question 138: If there is a practical change in the company structure, it ...
Question 139: For the process of forwarding the session of the first packe...
Question 140: Heartbeat message (He11o message): The two FWs send heartbea...
Question 141: Regarding NAT technology, which of the following description...
Question 142: Which of the following descriptions about the characteristic...
Question 143: As shown in the following, there are two Server Map entries ...
Question 144: After a cyber-attack event occurs, set up an isolation area,...
Question 145: Huawei's Agile-Controller products belong to ______ in the H...
Question 146: After the firewall detects a virus, which of the following w...
Question 147: Which of the following are remote authentication methods? (M...
Question 148: When one of the following situations occurs in the VGMP grou...
Question 149: in configurationNATDuring the process, in which of the follo...
Question 150: Which of the following is not included in the trigger authen...
Question 151: Manual auditing is a supplement to tool evaluation, it does ...
Question 152: Digital signature is to generate a digital fingerprint by us...
Question 153: Regarding the problem that users with two-way binding in aut...
Question 154: NAPT technology can realize a public IP address for multiple...
Question 155: According to the management regulations, regular inspections...
Question 156: Which one of the options below belong to the component of th...
Question 157: hen deploying dual-system hot backup on the firewall, in ord...
Question 158: After the firewall detects the virus, which of the following...
Question 159: In the USG system firewall, you can use which function to pr...
Question 160: In symmetric encryption algorithms, the algorithm is general...
Question 161: Man-in-the-middle attacks are data security threats....
Question 162: Which of the following options are key elements of informati...
Question 163: As shown in the figure, a TCP connection is established betw...
Question 164: Which of the following are the response actions of gateway a...
Question 165: Which of the following is true about the command to view the...
Question 166: existUSGConfiguration on the series firewallNAT Server, will...
Question 167: In the PKI system architecture, _______ is the CA's window t...
Question 168: When deploying the IPSec VPN tunnel mode, the AH protocol is...
Question 169: After an engineer configures the NAT-Server, in order to che...
Question 170: The content of intrusion detection covers authorized and una...
Question 171: Regarding the description of the operating system, which of ...
Question 172: About the packet iniptablesDescription of the transfer proce...
Question 173: Which of the following does not belong to the classification...
Question 174: In the process of using the digital envelope, which of the f...
Question 175: in deploymentIPSec VPN, which of the following is the main a...
Question 176: In the user management of Huawei firewall, which of the foll...
Question 177: _________ Mode: Two devices, one active and one standby. Und...
Question 178: Which of the following is the action to be taken in the summ...
Question 179: The SIP protocol uses SDP messages to establish a session, a...
Question 180: IPThe protocol in the header (protocol) field identifies the...
Question 181: Which of the following statements about investigation and ev...
Question 182: The protocol number of the transport layer protocol TCP is (...
Question 183: After a network intrusion event occurs, the identity of the ...
Question 184: When the command is executed on the firewall and the followi...
Question 185: The administrator wants to create a web configuration admini...
Question 186: Database operation records can be used as ___ evidence to ba...
Question 187: Which of the following options arewindowssystem andLINUXThe ...
Question 188: In response to network security incidents, remote emergency ...
Question 189: Information security precautions include both management and...
Question 190: aboutVPN, which of the following statements is false?...
Question 191: aboutHRPWhich of the following options is not included in th...
Question 192: Regarding the firewall security zone, which of the following...
Question 193: Common information security standards and specifications mai...
Question 194: Please match the whole worm virus attack process and attack ...
Question 195: Which of the following traffic matches the authentication po...
Question 196: Please sort by iptables table processing priority from large...
Question 197: The firewall is divided according to the protection object,w...
Question 198: Which of the following DDoS attack types is an attack?...
Question 199: Regarding the description of the GRE VPN tunnel configuratio...
Question 200: When configuring the security policy on the firewall, the op...
Question 201: Please match the following NAT technologies and realized fun...
Question 202: In tunnel encapsulation mode, there is no need to have the r...
Question 203: The process of electronic forensics includes: protecting the...
Question 204: Regarding the firewall security policy, the following items ...
Question 205: When configuring security policies, you can control traffic ...
Question 206: Which of the following options belongs to Tier 2VPNTechnolog...
Question 207: GREThe tunnel addresses at both ends of the tunnel can be co...
Question 208: In the Linux system, which of the following commands is used...
Question 209: Which of the following is not a common application scenario ...
Question 210: Which of the following are multi-user operating systems? (mu...
Question 211: about Internet users andVPNIn the description of access user...
Question 212: Regarding the NAT policy processing flow, which of the follo...
Question 213: Which of the following VPNs cannot be used in site-to-Site s...
Question 214: An employee of a company accesses the company's internal Web...
Question 215: Which of the following is the status information that can be...
Question 216: As shown in the figure, the nat server global 202.106.1.1 in...
Question 217: Data Analysis Technology is to find, match keywords or key p...
Question 218: Which of the following descriptions about the patch is wrong...
Question 219: Regarding the investigation and evidence collection, which o...
Question 220: MACWhich of the following mechanisms are used by flood attac...
Question 221: "Implement security monitoring and management of information...
Question 222: The world's first worm-"Morris Worm"Make people realize that...
Question 223: In the IPSec VPN transmission mode, which part of the data m...
Question 224: Equipment sabotage attacks are generally not easy to cause i...
Question 225: Information security graded protection is the basic system o...
Question 226: Which of the following options are harmful to traffic-based ...
Question 227: Which attack below is not a malformated packet attack?...
Question 228: Which of the following factors are related to the initial pr...
Question 229: When using the ______ function of SSL VPN, the virtual gatew...
Question 230: In the process of establishing IPSec VPN between the peers F...
Question 231: UDP port scanning means that the attacker sends a zero-byte ...
Question 232: In the Huawei SDSec solution, which layer of equipment does ...
Question 233: Which of the following options are technical characteristics...
Question 234: As shown in the figure below, the internal user online scene...
Question 235: In the process of using the digital envelope, which of the f...
Question 236: aboutNATConfiguration statement, which of the following is f...
Question 237: When the company's network administrator is performing dual-...
Question 238: In the _______ view of the firewall, you can use the reboot ...
Question 239: Which of the following is false for a description of an intr...
Question 240: SIPprotocol usageSDPmessage to establish a session,SDPThe me...
Question 241: IPSec VPN uses an asymmetric algorithm to calculate the ____...
Question 242: Which of the following options is correct for the descriptio...
Question 243: Which of the following mechanisms are used to implement MAC ...
Question 244: Which of the following options is correct regarding the matc...
Question 245: Which of the following is the default backup mode for dual-s...
Question 246: Regarding the statement of firewall security policy, which o...
Question 247: Which of the following descriptions of the VGMP protocol is ...
Question 248: Which of the following SSL VPN functions can only access all...
Question 249: The world's first worm virus-"Morris worm" makes people real...