Join the discussion
Question 1/101
As a network administrator, if you want to understand the security events of web attacks by viewing the logs on the WAF. What kind of logs do I need to see? (single selection).
Correct Answer: C
Add Comments
- Other Question (101q)
- Q1. As a network administrator, if you want to understand the security events of web attacks b...
- Q2. Which of the following types of journals cannot use the Netflow format? (single selection)...
- Q3. The following describes the transparent proxy deployment features of WAF Which is correct?...
- Q4. After you deploy HUAWEI CLOUD ANTI-DDoS Pro or Anti-DDoS Premium (DDoS Pro) or Anti-DDoS P...
- Q5. The signature filter will batch out signatures, and usually set to a uniform action for ea...
- Q6. In the Anh-DDos system What are the functions that ATIC can complete as a management cente...
- Q7. One of the reasons why traditional passive defense does not protect against APT attacks is...
- Q8. Which of the following devices can be used to sense the intranet situation in conjunction ...
- Q9. DAS (Direct Attach STorage) is a storage method that connects directly to the host server ...
- Q10. The global nature of the Internet exposes Teb services to attacks of varying sizes, sizes,...
- Q11. Data storage security is part of the customer's overall security program It is also an imp...
- Q12. The sandbox and the firewall link anti-virus After the sandbox detects the virus file, the...
- Q13. DNS Request Flood for DNS authoritative servers If TC source authentication is used The cl...
- Q14. If the database O&M workload is much greater than the host O&M workload, you can c...
- Q15. After you deploy HUAWEI CLOUD WAF Traffic to the tenant's Neb server is sent directly to t...
- Q16. Which is the more correct number of DNS servers that can be bound to each outbound interfa...
- Q17. The following describes port scanning Which is wrong? (single selection)....
- Q18. When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ...
- Q19. The following description of information security training Which items are correct? (multi...
- Q20. What is correct in the following description of the capabilities of cybertrapping techniqu...
- Q21. Whitelisting may not properly handle complex obfuscation, which could allow attackers to s...
- Q22. When deploying an Anti-DDos system using bypass, which of the following options is a commo...
- Q23. In the Anti-DDos system, the function of cleaning devices is to detect anomalous traffic i...
- Q24. Data destruction refers to the use of various technical means to completely delete the dat...
- Q25. When you use ATIC for defense policy configuration, the defense system that can be configu...
- Q26. PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion pro...
- Q27. With the following description of network scanning defense technology, which is correct? (...
- Q28. Which of the following measures can protect against viruses that spread through zero-day v...
- Q29. Implement secure communication network requirements for Class-Protect on HUAWEI CLOUD Whic...
- Q30. The following is a description of traceability audits Which one is correct? (single select...
- Q31. NIP Network Intelligent Protection System can support troubleshooting which of the followi...
- Q32. Which of the following does HiSec Insight's big data processing not include?...
- Q33. Common means of protecting against SYN Flood political attacks are link restriction techni...
- Q34. The following suggestions for deploying heartbeats between firewalls with hot standby on b...
- Q35. When the Abnormal Traffic Inspection & Control System^ defense strategy of the Abnorma...
- Q36. As shown in the following figure The headquarters network is deployed with dual machines, ...
- Q37. If you can successfully access www.huawei.com network resources, which of the following pr...
- Q38. Huawei's Sec Insight system comes with the function of stream pin....
- Q39. When using server authentication Before visiting the business, the visitor first logs in t...
- Q40. Take the following description of safety measures Which one is wrong? (single selection)....
- Q41. Which of the following options is required by Security Manager in Graded Protection 2.0 (m...
- Q42. In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion...
- Q43. If the attacker uses a fake address to launch a TCP flood attack Which of the following de...
- Q44. By default, two subnets of the same VPC network deployed in different physical resource po...
- Q45. Which of the following options is included in the network control layer in Huawei's cloud ...
- Q46. The SQL injection vulnerability occurs due to the lack of validation of the legitimacy of ...
- Q47. Which of the following threats cannot be detected by the sandbox virtual execution environ...
- Q48. Digital signature technology can guarantee the credibility of the data source and verify w...
- Q49. Anonymization and pseudonymization of data While reducing the risk of data privacy leakage...
- Q50. The sandbox is actively protected against viruses (single selection)...
- Q51. What are the logical/technical access controls in the following equation? (multiple select...
- Q52. When NIP is deployed at the Internet perimeter, it is generally deployed in the egress fir...
- Q53. Which of the following is not a way to back up data? (Single selection)...
- Q54. WAF devices cannot deploy DDoS protection against web websites...
- Q55. With the continuous development of network technology The firewall is also completing its ...
- Q56. The USG firewall is connected to the corporate intranet through a router After the firewal...
- Q57. As shown in the following figure, you use the bypass method to deploy the Anti-DDoS system...
- Q58. For the cloud Grade Protection Assessment, which of the following steps marks the end of t...
- Q59. An important purpose of adopting a distributed denial-of-service attack architecture is to...
- Q60. Figure 1 shows the raw data table Figure 2 shows the data processed by K*anonymization tec...
- Q61. NIP can scan the uploaded files for viruses to prevent intranet PCs from being infected wi...
- Q62. Which of the following can be used as a Huawei IPS device to determine intrusion behavior?...
- Q63. The following is a description of wide management Which one is incorrect? (single selectio...
- Q64. If the attributes of the file all match the match conditions of the rule Then this file su...
- Q65. The following is a description of FW's audit conduct. Which one is correct? (single select...
- Q66. The following is a description of DNS transparent proxy Which ones are correct? (multiple ...
- Q67. What are the common database intrusion detection techniques? (Multiple selection)...
- Q68. To implement private network user A to access the Internet network after user B That is, w...
- Q69. Categorize vulnerabilities by common ways Which of the following types of vulnerabilities ...
- Q70. Which of the following options is primarily detected by Threat Detection Services (MTD)?...
- Q71. Which of the following is wrong about Huawei's approach to business security resilience? (...
- Q72. The firewall policy feature supports IPv4, but does not support IPv6 (radio selection)....
- Q73. Common database security audit techniques according to technical characteristics What are ...
- Q74. Which of the following attack methods of 24L can be used in the strike phase of the cyber ...
- Q75. The server can set or read the information contained in the cookie This maintains state in...
- Q76. In the Cloudabric scenario, which of the following ways is the firewall deployed?...
- Q77. Which of the following scenarios is for network intrusion prevention? (multiple selection)...
- Q78. Which of the following options is not included in virtualization security? (single selecti...
- Q79. L2TP over IPsec combines the advantages of both VPNs to provide secure user access. Which ...
- Q80. In the Active Directory architecture, which of the following is a function of the network ...
- Q81. In accordance with the provisions of the National Cybersecurity Law... Private clouds need...
- Q82. The National Graded Protection System (GB) is in the process of grading The assessment is ...
- Q83. Which of the following options are the main dangers of computer Trojans?...
- Q84. Digital certificates can ensure the credibility of the public key of the communicating par...
- Q85. To protect against viruses, which of the following security appliances can be deployed at ...
- Q86. USG firewall's DDoS attack prevention techniques include which of the following?...
- Q87. The following description of security protection, which one is correct" (single selection)...
- Q88. Which of the following can be used to block C&C attacks? (multiple selection)....
- Q89. On the principle of defense against trapping Which of the following is described as incorr...
- Q90. The significance of information security standards is to provide an overall level of secur...
- Q91. In the following description of the USG firewall security policy, which one is wrong?...
- Q92. Which of the following standard bills is relevant to security audits? (Multiple selection)...
- Q93. Which of the following options is a pseudonymized method for data?...
- Q94. Verify user-provided data in the form of whitelists or blacklists, and construct SQL sente...
- Q95. A data center creates subnet A and subnet B under the same VPC network If you add the host...
- Q96. The target IP address information can be collected through attacks, such as distributed de...
- Q97. The following describes the role of logs Which one is wrong? (single selection)....
- Q98. The following describes the authentication method and authentication domain relationship f...
- Q99. The path by which Trojan files spread
- Q100. What are the correct options for describing the impact of IPv6 technology on cyberattacks ...
- Q101. The following description of the IPv6 stateless address DAD check, which one is wrong? (si...
