1.
Which of the following is not a major feature of the information security
           system?
                 Commonality correct
                 Non-repudiation
                 Integrity
                 Controllability
           2.Checking the system running status, collecting system fault information,
           and detecting information security incidents are all actions in cyber security
           emergency response. Which of the following phases do these actions belong
           to?
                                                    m
                                              er as
                 Detection phase correct
                                                  co
                                            eH w
                 Preparation phase
                                                o.
                 Recovery phase
                 Response phase           rs e
                                        ou urc
           3.Which of the following is an analysis layer device in the Huawei SDSec
                                            o
           solution?
                                      aC s
                                    vi y re
                 Agile Controller
                 CIS
                                ed d
                 Firehunter correct
                              ar stu
                 Switch
           4.Which of the following is not a state of the Huawei Redundancy Protocol
                                  is
           (HRP) heartbeat interface?
                   Th
                 Ready
                               sh
                 full correct
                 running
                 Invalid
This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00
https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
           5.When a cyber security issue occurs, the severity of the issue must be
           determined first and immediately reported.
                 True
                 False correct
           6.Which of the following methods can be used by an administrator to log in
           to Huawei routers for the first time?
                 Telnet
                 Web
                 SSH
                                                    m
                                              er as
                 Console correct
                                                  co
                                            eH w
           7.In the ARP address resolution process, ARP-Reply packets are sent in
                                                o.
           broadcast mode. All hosts on the same Layer 2 network can receive these
                                          rs e
           packets and learn the mapping between IP and MAC addresses from them.
                                        ou urc
                 True
                                            o
                 False correct
                                      aC s
                                    vi y re
           8.When intranet users access the Internet, you can configure a source NAT
           policy in the easy-ip format.
                                ed d
                              ar stu
                 True correct
                 False
                                  is
           9.Which of the following password settings is the most secure?
                   Th
                 Digits+letters+special characters correct
                 Letters only
                               sh
                 Digits only
                 Digits+letters
This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00
https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
           10.Which of the following is not a risk identification phase in risk assessment
           of ISO 27001?
                 Weaknesses identification and assessment
                 Penetration test
                 Network architecture analysis
                 Risk avoidance correct
           11.Which of the following statements is false about iptables?
                 The table of iptables consists of chains, and a chain consists of rules.
                 iptables is a free packet filtering firewall.
                                                    m
                                              er as
                 The table processing priority is mangle > raw > nat > filter. correct
                                                  co
                                            eH w
                 A Linux firewall consists of netfilter and iptables.
                                                o.
                                          rs e
           12.A vulnerability is usually called a virus.
                                        ou urc
                 True
                                            o
                 False correct
                                      aC s
                                    vi y re
           13.Which layer of the OSI model can encrypt data formats and data?
                                ed d
                 Application layer
                              ar stu
                 Presentation layer correct
                 Session layer
                                  is
                 Transport layer
                   Th
           14.Which of the following statements is true about antivirus software?
                               sh
               The virus library of antivirus software usually lags behind computer
           viruses. correct
               Computers that have antivirus software installed will not be infected by
           viruses.
                 Antivirus software can kill all found viruses.
This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00
https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
              Good antivirus software can kill all viruses.
           SubmitSubmit Your Answer
           You have used 3 of 3 attempts
           Correct (70/70 points)
           Review
           Multiple Choice
           30 points possible (graded)
           1.Which of the following statements are true about the signature in
           certificate content?
                 It indicates the encryption result of the public key.
                 It indicates the encryption result of the certificate information.
                                                    m
                                              er as
                 It is generated by encrypting the private key of the certificate issuer.
                                                  co
                                            eH w
              It is generated by encrypting the private key of the public key owner.
           unanswered
                                                o.
                                          rs e
                                        ou urc
           2.Which of the following statements are false about the IPsec VPN key
           generation mode?
                                            o
                                      aC s
                 The key can be manually configured.
                                    vi y re
                 The key can be generated using IKE.
                 The key generated using IKE can be periodically changed.
              The key generated during IKE negotiation cannot be used to authenticate
                                ed d
           identity information.
                              ar stu
           unanswered
           3.Which of the following are included in AAA?
                                  is
                   Th
                 Authentication
                 Authorization
                               sh
                 Accounting
              Audit
           unanswered
           4.Which of the following statements are true about penetration test steps?
This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00
https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
                                                 Collect information and analyze network conditions before a penetration
                                              test.
                                                    Escalate access control rights for implementing a penetration test.
                                                    After a penetration test is complete, directly output a test report.
                                                 Provide security suggestions after a test report is output.
                                              unanswered
                                              5.Which of the following statements are true about the functions of the
                                              "allow l2tp virtual-template 0 remote client" command in L2TP configuration?
                                                    This command specifies the virtual interface template to be used.
                                                    This command specifies the peer tunnel name.
                                                                                       m
                                                                                 er as
                                                    This command specifies the local tunnel name.
                                                                                     co
                                                                               eH w
                                                 You do not need to specify the tunnel name in certain cases.
                                              unanswered
                                                                                   o.
                                                                             rs e
                                                                           ou urc
                                              6.Which of the following actions should be taken in the recovery phase of
                                              cyber security emergency response?
                                                                               o
                                                 Continuously monitor the devices that go online again to learn their
                                                                         aC s
                                              running status.
                                                                       vi y re
                                                    Set an isolation zone, summarize data, and estimate loss.
                                                  Restore the configuration of the damaged network devices and back up
                                                                   ed d
                                              all changes.
                                                                 ar stu
                                                 Set up management and technical teams and assign responsibilities to
                                              personnel.
                                                                     is
                                                      Th
                                                                  sh
                                   This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00
                                   https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
Powered by TCPDF (www.tcpdf.org)