When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.
155955cc-666171a2-20fac832-0c042c0435
A. False
B. True
正解:B
質問 2:
The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.
A. False
B. True
正解:B
質問 3:
Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.
A. False
B. True
正解:A
質問 4:
Which of the following files can the sandbox detect? (multiple choice)
A. www file
B. PE file
C. Picture file
D. Mail
正解:A,B,C
質問 5:
When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?
A. Can pick up? The network needs to be repaired before you can access network resources.
B. Can access the network? Can also access network resources.
C. Cannot access the network.
D. You can access the network, but you need to re-authenticate to access network resources.
正解:A
質問 6:
Which of the following equipment is suitable for use MAC Authentication access network?
A. Office Windows System host
B. Mobile client, such as smart phone, etc
C. For testing Linux System host
D. Network printer 232335
正解:D
質問 7:
Configure the following commands on the Huawei firewall:
[USG] interface G0/0/1
[USG] ip urpf loose allow-defult-route acl 3000
Which of the following options are correct? (multiple choice)
A. For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly
B. For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall If it does not exist, the message will be rejected.
C. For the configuration of the default route, and at the same time matching the parameter allow-defult-route, if the source address of the message is in the FIB table of the firewall If it does not exist in the l0e check, the packet cannot pass the URPF check.
D. For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.
155955cc-666171a2-20fac832-0c042c0427
正解:A,B,D
質問 8:
The user accesses the network through the network access device, and the third-party RADIUS server authenticates and authorizes the user. Regarding the certification process, which of the following options is wrong?
A. Configure the Agile Controller-Campus for local data source authentication, receive the packets sent by the device, and perform authentication.
B. Configure RADIUS authentication and authorization on the Agile Controller-Campus.
C. Configure RADIUS authentication and accounting on the RADIUS server.
D. Configure RADIUS authentication and accounting on the device side. W"
正解:A
Yamabuki -
試験合格できました。模擬テストでは、間違った問題を何度も復習出来るようになって、試験中にも簡単に答えました。
ありがとうございました。