IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions, please feel free to contact us at feedback@certsout.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.
Copyright
support@certsout.com
The product of each order has its own encryption code, so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Question #:1
In the enterprise network, the source IP address and the destination IP address need to be translated at the same time, and there is no fixed mapping relationship before and after the destination IP address translation The following USC firewall features which combined can buy cash out less demand
Static mapping
Static destination NAT
Dynamic destination NAT
Source NAT
Answer: B D
Question #:2
The main role of the audit system is to audit security events after the fact To provide sufficient evidence, a security audit product must have which of the following features7
Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation
It can provide fine-grained access control to maximize the security of user resources
It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account
It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise
Answer: D
Question #:3
The antivirus system identifies the target of attack based on the characteristics of the detected object The APT defense system identifies the attack object based on the behavior of the detected object.
Answer: A
Question #:4
The following describes the security risks caused by ordinary users Which gas single choice is wrong)
Unauthorized access to business systems unrelated to their own work
The user copies the screen content, My Screen or copied by other unlawful means Download the data library.
Fake user identity query and obtain data resulting in data leakage 5JL
Accidental operation causes the O&M database to be deleted, Destruction.
Answer: D
Question #:5
The following describes how to create a trap account Which one is correct? (single selection).
Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits
Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits
Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits
D. Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits
C
Question #:6
In 2017, hackers unveiled a slew of cyberattack tools, including Eternal Blue tools. Then • Eternal Blue exploits the vulnerability of which of the following options of the Windows system can obtain the maximum relaxation limit of the system.
UMCODE vulnerability
Printer vulnerability
Frontpage server extension vulnerability
SMB vulnerabilities
Answer: C
Question #:7
Which of the following options fall under the umbrella of Internet perimeter security considerations? (multiple selection).
Anti-ARP attacks
Protects against DDos attacks
Anti-virus
Leak prevention
Answer: B C D
Question #:8
The following is a humble description of transparent and reverse proxies Which items are correct? (multiple selection).
The deployment method of reverse proxy requires directing traffic to the WAF device.
The deployment method of transparent proxy requires directing traffic to the WAF device.
The deployment method of transparent proxy is to connect devices in the network.
The deployment method of reverse proxy is to connect devices in the network.
Answer: A C
Question #:9
DAS (Direct Attach STorage) is a storage method that connects directly to the host server Each host server has its own storage device o features about DA5 Which of the following options is incorrectly described?
DAS has the advantages of high bandwidth and low latency
DAS does not support file sharing with heterogeneous operating systems
DAS is usually used in a single network environment with minimal data exchange and low performance requirements
DAS is a type of block storage
Answer: A
Question #:10
Which of the following services are security management services in HUAWEI CLOUD solutions?
A. B. C. D.
DDOS Anti-DDoS Pro IP services
Situational awareness services
SSL certificate management service
Security Expert Services
Answer: A B C D
About certsout.com
certsout.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below.
Sales: sales@certsout.com
Feedback: feedback@certsout.com
Support: support@certsout.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24 hours.