0% found this document useful (0 votes)
170 views5 pages

This Study Resource Was: Correct

This study source examines a multiple choice exam covering various topics in cybersecurity. It tests knowledge of information security systems, cybersecurity emergency response phases, network device types, network protocols, password security, risk assessment methodologies, firewall configurations, vulnerabilities, data encryption standards, and antivirus software functionality. The questions cover technical topics as well as best practices for security operations, assessments, and incident response.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views5 pages

This Study Resource Was: Correct

This study source examines a multiple choice exam covering various topics in cybersecurity. It tests knowledge of information security systems, cybersecurity emergency response phases, network device types, network protocols, password security, risk assessment methodologies, firewall configurations, vulnerabilities, data encryption standards, and antivirus software functionality. The questions cover technical topics as well as best practices for security operations, assessments, and incident response.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

Which of the following is not a major feature of the information security


system?

Commonality correct
Non-repudiation
Integrity
Controllability

2.Checking the system running status, collecting system fault information,


and detecting information security incidents are all actions in cyber security
emergency response. Which of the following phases do these actions belong
to?

m
er as
Detection phase correct

co
eH w
Preparation phase

o.
Recovery phase
Response phase rs e
ou urc
3.Which of the following is an analysis layer device in the Huawei SDSec
o

solution?
aC s
vi y re

Agile Controller
CIS
ed d

Firehunter correct
ar stu

Switch

4.Which of the following is not a state of the Huawei Redundancy Protocol


is

(HRP) heartbeat interface?


Th

Ready
sh

full correct
running
Invalid

This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00

https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
5.When a cyber security issue occurs, the severity of the issue must be
determined first and immediately reported.

True
False correct

6.Which of the following methods can be used by an administrator to log in


to Huawei routers for the first time?

Telnet
Web
SSH

m
er as
Console correct

co
eH w
7.In the ARP address resolution process, ARP-Reply packets are sent in

o.
broadcast mode. All hosts on the same Layer 2 network can receive these
rs e
packets and learn the mapping between IP and MAC addresses from them.
ou urc
True
o

False correct
aC s
vi y re

8.When intranet users access the Internet, you can configure a source NAT
policy in the easy-ip format.
ed d
ar stu

True correct
False
is

9.Which of the following password settings is the most secure?


Th

Digits+letters+special characters correct


Letters only
sh

Digits only
Digits+letters

This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00

https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
10.Which of the following is not a risk identification phase in risk assessment
of ISO 27001?

Weaknesses identification and assessment


Penetration test
Network architecture analysis
Risk avoidance correct

11.Which of the following statements is false about iptables?

The table of iptables consists of chains, and a chain consists of rules.


iptables is a free packet filtering firewall.

m
er as
The table processing priority is mangle > raw > nat > filter. correct

co
eH w
A Linux firewall consists of netfilter and iptables.

o.
rs e
12.A vulnerability is usually called a virus.
ou urc
True
o

False correct
aC s
vi y re

13.Which layer of the OSI model can encrypt data formats and data?
ed d

Application layer
ar stu

Presentation layer correct


Session layer
is

Transport layer
Th

14.Which of the following statements is true about antivirus software?


sh

The virus library of antivirus software usually lags behind computer


viruses. correct
Computers that have antivirus software installed will not be infected by
viruses.
Antivirus software can kill all found viruses.

This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00

https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
Good antivirus software can kill all viruses.
SubmitSubmit Your Answer
You have used 3 of 3 attempts
Correct (70/70 points)
Review

Multiple Choice

30 points possible (graded)


1.Which of the following statements are true about the signature in
certificate content?

It indicates the encryption result of the public key.


It indicates the encryption result of the certificate information.

m
er as
It is generated by encrypting the private key of the certificate issuer.

co
eH w
It is generated by encrypting the private key of the public key owner.
unanswered

o.
rs e
ou urc
2.Which of the following statements are false about the IPsec VPN key
generation mode?
o
aC s

The key can be manually configured.


vi y re

The key can be generated using IKE.


The key generated using IKE can be periodically changed.
The key generated during IKE negotiation cannot be used to authenticate
ed d

identity information.
ar stu

unanswered

3.Which of the following are included in AAA?


is
Th

Authentication
Authorization
sh

Accounting
Audit
unanswered

4.Which of the following statements are true about penetration test steps?

This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00

https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
Collect information and analyze network conditions before a penetration
test.
Escalate access control rights for implementing a penetration test.
After a penetration test is complete, directly output a test report.
Provide security suggestions after a test report is output.
unanswered

5.Which of the following statements are true about the functions of the
"allow l2tp virtual-template 0 remote client" command in L2TP configuration?

This command specifies the virtual interface template to be used.


This command specifies the peer tunnel name.

m
er as
This command specifies the local tunnel name.

co
eH w
You do not need to specify the tunnel name in certain cases.
unanswered

o.
rs e
ou urc
6.Which of the following actions should be taken in the recovery phase of
cyber security emergency response?
o

Continuously monitor the devices that go online again to learn their


aC s

running status.
vi y re

Set an isolation zone, summarize data, and estimate loss.


Restore the configuration of the damaged network devices and back up
ed d

all changes.
ar stu

Set up management and technical teams and assign responsibilities to


personnel.
is
Th
sh

This study source was downloaded by 100000797122378 from CourseHero.com on 10-12-2021 21:53:56 GMT -05:00

https://www.coursehero.com/file/63064620/HCIA-Securitydocx/
Powered by TCPDF (www.tcpdf.org)

You might also like