Let's see which devices can be used as Huawei CIS (Cybersecurity Intelligence system.). Trapping probes in network security intelligence systems?
A VPCA and VPCB are created under a virtual data center VDC, and host A (192.168.1.100/24) is applied for in the VPCA Filed Host B (1921682100/24). Now configure VPC access Create a virtual firewall security policy as follows:
Security-policy
Source-zone any
destination-zone any
source-address 192.168.2.100 32
destination-address 192.168.1.100 32
action permit
Which of the following statements is correct?
Which of the following attack methods of 24L can be used in the strike phase of the cyber attack chain? (multiple selection).
JDBC is a mechanism for Java applications to talk to various different databases, and ODEC, similar to JDEC, is also an important database access technology.
Which of the following options allows complete destruction of data, (multiple selection)
Take the following about
1ã€Icx.exe-slave 192.168.122.111:4444 192.168.122.128:3389
2ã€lex -listen 3456 3789
What is the correct understanding? (Multiple selection)
IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?
In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).
Which of the following implementation elements is a multi-choice that can be controlled throughout cloud operations).
The FireHunter series of sandboxes gives accurate results based on the analysis Real-time detection, blocking and reporting of grayscale â– Flow volume Effectively avoid the rapid spread of unknown threat attacks and the loss of enterprise core information assets.
The following is a description of traceability audits Which one is correct? (single selection).
According to the type and purpose of the bait, it can be divided into log bait, certificate bait, account bait, email bait, project code bait, etC.
The target IP address information can be collected through attacks, such as distributed denial-of-service attacks to obtain the target's IP information. (single selection).
Requirements for physical facilities in the computer room in Class Protection 2.0
PROTECTION AGAINST SLOW ATTACKS IN DDOS Anti-DDoS solutions with intelligent and anthropomorphic functions are better at defending against such attacks (single selection).
If it is in the intrusion prevention configuration file Signatures, signature filters, and exception signatures are used at the same time When there is a configuration to the configuration file The following is about the order of matching Which option is correct? (single selection).
Which of the following can be used as a Huawei IPS device to determine intrusion behavior? (single selection).
Regarding ECA probe carrier entities, which of the following cannot be ECA probe carrier entities?
The following describes how to create a trap account Which one is correct? (single selection).
Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits
Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits
Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits
D. Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits
Which of the following options is part of the business security resiliency (multiple choices)?
Digital certificates can ensure the credibility of the public key of the communicating partner in the process of data transmission.
Huawei's network security intelligence system CIS can only be linked with which of the following devices to block viruses?
In the WAF defense-in-depth system, which of the following security checks is used to protect against CC attacks? (single selection).
Which of the following are the certification factors in the biometric category?
In the cloud data center network Where are Anti-DDos appliances deployed? (single selection).
By default, the firewall authenticates traffic that passes through itself.
When personal privacy information is violated or leaked How to deal with the adoption of self-help measures?
Nmap can only be used to scan a single host, but it cannot be used to scan a large computer network to find out which hosts and services of interest are found
With the following description of the database auditing system, which option is wrong? (single selection).
Which of the following are the following ways to protect enterprise users from viruses? (Multiple selection)
In the HCIE-Security V2.0 course architecture, which of the following pieces are included? (multiple selection).
Data storage security is part of the customer's overall security program It is also an important part of data center security and organizational security. Which of the following options is important to keep your data storage secure?
After you deploy HUAWEI CLOUD ANTI-DDoS Pro or Anti-DDoS Premium (DDoS Pro) or Anti-DDoS Pro, whether or not a DDoS attack occurs All access traffic is sent directly to the origin server IPo
In the Cloudabric scenario, which of the following ways is the firewall deployed?
the electric power and military industry-related industries need to use several levels of equal protection
DNS Request Flood for DNS authoritative servers If TC source authentication is used The client device does not support using TCP to send DNS requests, how to verify the identity of the client? (single selection).
Log formats are diverse At present, there is no unified log format standard in the world, and different manufacturers have formulated corresponding log formats (single selection) according to their own needs