Please match the following information security risks to information security incidents one by one.[fill in the blank]*
physical security riskEnterprise server permissions are loosely set
Information Security Management RiskInfected Panda Burning Incense
Information Access RiskFire destroyed equipment in computer room
application riskTalk to people about leaking company secrets
Company network administrator allocation. After the dual-system hot backup is set, run the command to check VRRP and other information, and get the following information
HRP_M
Gigabi tEtherneto/0/3 Virtual Router 1
State: Master
Virtual IP: 10.3.0.3
Master IP: 10.3.0.1
PriorityRun: 120
PriorityConfig:100
MasterPriority: 120
Preempt: YESDelay Time: 0 s
TimerRun: 60s
TimerConfig: 60s
Auth type: NONE
Virtual MAC: 0000-5e00-0101
Check TIL: YES
Config type:vgmp Vrrp
Backup-torward: disabled
Create time:2020-03-17 17:35:54 UTC+08:02
Last change time: 2020-03-22 16:01:56 UTC+08:02
Ask him to type the view command in the blank space is ____
[fill in the blank]*
Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*
The TCP/IP protocol stack packet encapsulation includes: Which of the following describes the encapsulation order (sort order: ABDC)
After an engineer completes the source NAT configuration, the internal network still cannot access the external network. The engineer wants to query the detailed information of the address translation by using the command to query the session table, so the engineer directly uses the ( ) command in the user view to query the address translation. information. (fill in the blank)
An enterprise wants to build a server system and requires the following functions: 1. The enterprise needs to have its own dedicated mailbox, and the sending and receiving of emails needs to go through the enterprise's server; 2. The server must provide file transfer and access services. Users in different departments of the enterprise provide accounts with different permissions: 3. When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ( )*
In symmetric encryption algorithms, the algorithm is generally used on data communication channels, browsers or network links (). (fill in the blank)
Which of the following is an "information sabotage incident" in the classification of network security incidents?
The most common three-level standard for equal protection includes three aspects: physical security, data security and network security.
We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*
The IDS is usually installed on the switch to detect intrusion, and at the same time, it can avoid the single point of failure affecting the normal operation of the network.
Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*
There are two ways for a PKI entity to apply for a local certificate from a CA: ( ). (fill in the blank)
Which of the following does not belong to the log format of the firewall? ( )[Multiple choice]
Multiple different ( ) cannot be added to the same interface on the firewall at the same time (fill in the blank)
In digital signature technology, we usually encrypt the digital fingerprint with the sender's ( ). (fill in the blank)
pass throughdisplay ike sa The results you see are as follows. Which of the following statements is false?
Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)
In a stateful inspection firewall, when the stateful inspection mechanism is enabled, the second packet of the three-way handshake (SYN+ACK) when reaching the firewall, which of the following descriptions is correct if there is no corresponding session table on the firewall?
at HuaweiSDSecIn the solution, which layer of equipment does the firewall belong to?
In the process of digital signature, which of the following is mainly carried outHASHAlgorithms thereby verifying the integrity of data transmissions?
Firewall in addition to supporting built-inPortalIn addition to authentication, it also supports customizationPortalauthentication, when using customPortalDuring authentication, there is no need to deploy externalPortalserver.
aboutGREEncapsulation and decapsulation, which of the following descriptions is false?
Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?
NAPTtechnology can realize a public networkIPThe address is used by multiple private network hosts
Which of the following is an action to be taken during the summary phase of a cybersecurity emergency response? (multiple choice)
Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission
Firewall usagehrp standby config enableAfter the command to enable the configuration function of the standby device, all the information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.
useiptablesWrite a rule that doesn't allow172.16.0.0/16Which of the following rules is correct?
On the surface, threats such as viruses, loopholes, and Trojan horses are the causes of information security incidents, but at the root, information security incidents are also closely related to people and the information system itself.
Evidence identification needs to address the verification of the integrity of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the criteria for identification of evidence?
Servers are classified by form factor, which of the following types can be classified? (multiple choice)
Which of the following options is notUSG6000What file formats are supported by serial devices for saving certificates?
IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data
existIPSec VPNIn the transmission mode, which part of the encrypted data packet is?
aboutNATPolicy processing flow, which of the following options are correct? (multiple choice)
When configuring user single sign-on, if you use the mode of querying the AD server security log, please check the followingcertifiedProcedureEnterRow ordering:[fill in the blank]*
The AD monitor forwards the user login message to F7, and the user goes online at F7.
AD monitor through the WMI interface provided by AD server. Connect to the AD server to query the security log. Get the user login message.
accessboardrecord AD domain, AD servicedevicerecorduseHouseholdsuperiorStringinformation into the security log.
The AD monitor starts from the time when the AD single sign-on service starts, and regularly queries the security logs generated on the AD server.
After the firewall detects a virus, which of the following will release the virus? ( )[Multiple choice]*
In the classification of the information security level protection system, which of the following levels define that if the information system is destroyed, it will cause damage to social order and public interests? (multiple choice)
UDPA port scan is when an attacker sends a zero byte lengthUDPmessage to a specific port of the target host, if the port is open, it will return aICMPPort reachable data packets.
Which of the following categories are included in Huawei Firewall User Management? (multiple choice)
In which of the following scenarios does the firewall generate the Server map table? ( )
When using the ______ function of SSL VPN, the virtual gateway will assign an intranet IP address to the access user, which is used for the access user to access the P resources of the intranet[fill in the blank]*
User authentication is the authentication of the client identity by the SSL virtual gateway, including: ______, server authentication, certificate anonymous authentication and certificate challenge authentication.[fill in the blank]
In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)
Huawei's Agile-Controller products belong to ______ in the HiSec solution.[fill in the blank]
Which of the following protocols is not a protocol type that ASPF can detect? ( )[Multiple choice]*
When the user uses the session authentication method to trigger the firewall built-inPortalDuring authentication, users do not actively perform identity authentication, advanced service access, and device push"redirect"to the certification page
Which of the following statements is true about Huawei's routers and switchers??(multiple choice)
ASPF (Application specific Packet Filter)It is a packet filtering technology based on the application layer, andserver-mapTables implement special security mechanisms. aboutASPFandserver-mapWhich of the following statements is correct? (multiple choice)
HTTPmessage usageUDPcarry, andHTTPSprotocol based onTCPthree-way handshake, soHTTPSSafer and more recommendedHTTPS.
Which of the following information is not the backup content included in the status information backup in the dual-system hot backup? ( )[Multiple choice]*
When configuring user single sign-on, use the receivePCIn message mode, the authentication process has the following steps:
1. visitorPCExecute the login script and send the user login information toADmonitor
2. Firewall extracts user andIPAdd the correspondence to the online user table
3. ADmonitor connected toADThe server queries the login user information and forwards the queried user information to the firewall
4. visitor loginADarea,ADThe server returns a login success message to the user and issues the login script. Which of the following is the correct order?
Which of the following is an action to be taken during the eradication phase in a cybersecurity emergency response? (multiple choice)
In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking. Which of the following options are correct for the description of tracking technology? (multiple choice)
When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*