Stuxnet is a computer worm that attacks industrial control systems. Which of the following is the correct sequence of Stuxnet virus attacks?
ASearch for targets -> Reconnaissance organizational structure and personnel Information -> Social engineering penetration -> Lateral movement using USB flash drives -> Launch attacks
BReconnaissance organizational structure and personnel information -> Social engineering penetration -> Lateral movement using USB flash drives -> Search for targets -> Launch, attacks
CSocial engineering penetration ->Reconnaissance organizational structure and personnel information -> Lateral movement using USB flash drives -> Search for targets -> Launch attacks
DReconnaissance organizational structure and personnel information -> Social engineering penetration -> Search for targets -> Lateral movement using USB flash drives -> Launch attacks
The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.
ATRUE
BFALSE
Which of the following statements are true about PBR matching conditions? (Choose all that apply.)
AThe application type of traffic can be specified. The “application” condition allows a firewall to distinguish different applications that use the same protocol and port number, achieving more refined network management.
BTo match traffic with different priorities, you can set the DSCP priority as a matching condition when creating a PBR rule.
CThe source security zone and inbound interface can be sued together to match user traffic more accurately.
DTo enable a PBR rule to take effect only in a specified time range, you can set the time range as a matching condition when creating the PRB rule.
Which of the following statements is false about the system version upgrade for firewalls working in hot standby mode?
AThe system version upgrade has requirements on the device model and source version.
BUpgrade the active firewall before the standby one.
CThe system version upgrade is required when the firewalls need some features that are unavailable in the current version.
DThe system version upgrade is required when the current version has a bug.
To defend against network attacks, you only need to deploy security devices (such as a firewall and IPS) at the Internet egress. No security device needs to be deployed on the enterprise intranet.
ATRUE
BFALSE
Question 6
Network Security
0
Question 7
Network Security
Question 8
Network Security
Question 9
Network Security
Question 10
Network Security
Question 11
Network Security
Question 12
Network Security
Question 13
Network Security
Question 14
Network Security
Question 15
Network Security
Question 16
Network Security
Question 17
Network Security
Question 18
Network Security
Question 19
Network Security
Question 20
Network Security
Question 21
Network Security
Question 23
Network Security
Question 24
Network Security
Question 25
Network Security
Question 26
Network Security
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
If a third-party admission device configured on iMaster NCE-Campus uses the default port 2000 for Portal authentication, the port umber in the Portal server template configured on the third-party admission device must also be set to 2000.
ATRUE
BFALSE
Which of the following statements are true about virtual systems and VPN instances? (Choose all that apply.)
AWhen you create a virtual system on the firewall, the firewall automatically generates a VPN instance with the same name.
BThe administrator uses the VPN instance manually created using the ip vpn-instance command.
CBoth virtual systems and VPN instances can implement service isolation and route isolation.
DVPN instances support multicast protocols.
The firewall can prevent spam from flooding the intranet through IP address check.
ATRUE
BFALSE
An IPsec VPN is established in IKEv1 main mode. When a NAT device is detected, port number translation starts from which of the following ISAKMP messages?
AMessage 5
BMessage 3
CMessage 4
DMessage 6
An enterprise needs to manage and control guest access behaviors while facilitating guest access. Which of the following authentication modes is recommended for such guest scenarios?
AMAC address bypass authentication
B802.1X authentication
CPortal authentication
DMAC address authentication
An IPS signature is a set of signatures that meet specified filtering conditions. Which of the following is not a filtering condition of a signature filter?
AProtocol
BSignature ID
COS
DCategory
Which of the following is the correct sequence of steps in the Huawei intrusion prevention configuration process?
AUpdate the signature database -> Configure an IPS profile -> Configure signatures -> Verify the configuration
BConfigure signatures -> Update the signature database -> Configure an IPS profile ->Verify the configuration
CConfigure an IPS profile -> Update the signature database -> Configure signatures -> ->Verify the configuration
DUpdate the signature database -> Configure signatures -> Configure an IPS profile -> ->Verify the configuration
The Common Vulnerability Scoring System (CVSS) is a widely used open standard for vulnerability scoring. It uses a modular scoring system. Which of the following is not included in the CVSS?
AEnvironmental
BBase
CTemporal
DSpatial
Which of the following operations are performed in the eradication phase of emergency response? (Choose all that apply.)
AEnabling security audit
BUsing antivirus software to remove viruses from terminals
CConfiguring ACLs on an enterprise’s internal switches to prevent viruses from spreading on the internal network
DStrengthening cyber security education and publicity
In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?
AIP address
BMAC address
CRole
DPort number
In MAC address authentication scenarios, users do not need to manually enter the user name and password. Which of the following is used as the user name for user authentication?
AIP address
BInterface number
CMAC address
DAccount
For normal TCP packets, which of the following situations may occur in the flag bit? (Choose all that apply.)
ABoth the SYN and RST bits are 1.
BBoth the RST and FIN bits are 1.
CBoth the FIN and URG bits are 1.
DBoth the SYN and ACK bits are 1.
DRAG DROP -
Match the SSL VPN resource release modes with the corresponding concepts.
When iMaster NCE-Campus is used as a Portal server, to enable iMaster NCE-Campus to match corresponding Portal pages based on the user IP addresses, which of the following URL parameters needs to be configured during configuration of the URL template on an access device?
Adevice-mac
Buser-ipaddress
Cuser-mac
Dssid
Process check is used to check whether abnormal processes exist and determine whether the service host is intruded or implanted with Trojan horses or backdoor programs. However, it cannot detect malicious programs that are not running and lurk within the system.
ATRUE
BFALSE
If any illegitimate email encapsulated in POP3 or IMAP messages is detected, the firewall can only block the email.
ATRUE
BFALSE
Which of the following statements are true about virtual interfaces? (Choose all that apply.)
AThe virtual interface is named in the format: Virtual-if+ IP address.
BThe virtual interface of the public system is Virtual- if1.
CA virtual interface must be configured with an IP address and assigned to a security zone. Otherwise, it cannot work properly.
DAfter a virtual system is created, the system automatically creates a virtual interface.
Which of the following parameters is not a condition for classifying global route selection policies?
AWeight
BPort number
CQuality
DBandwidth
On a WLAN where the WAC has Portal authentication configured, VLAN authorization can be implemented with no additional configuration required. After Portal authentication is complete, the WAC forwards STA traffic based on the authorized VLANs.
ATRUE
BFALSE
Which of the following file type anomalies can be identified by the firewall? (Choose all that apply.)