Huawei HCIA-Security V4.0 Sample Questions:
1. Which of the following protocols are file transfer protocols? (Multiple Choice)
A) HTTP
B) NFS
C) POP3
D) FTP
2. Which of the following is an action to be taken during the eradication phase of cybersecurity emergency response? (Multiple Choice)
A) Find Trojans, illegal authorization, system vulnerabilities, and deal with them in a timely manner
B) Revise security policies based on security incidents that occur and enable security auditing
C) Confirm the extent of damage caused by security incidents and report security incidents
D) Block the behavior of launching attacks and reduce the scope of impact
3. During anti-virus processing, which of the following exception actions can be performed by application exceptions? (Multiple Choice)
A) Delete attachments
B) Allow
C) Block
D) Alarm
4. The protocol field in the IP header identifies the protocol used by the upper layer. Which of the following field values indicates that the upper layer protocol is UDP?
A) 18
B) 17
C) 11
D) 6
5. Which of the following descriptions about firewall hot backup is incorrect?
A) If the hardware and software of the two FWs are different, dual-machine hot backup can be configured.
B) When one FW fails, the business traffic can be smoothly switched to another device for processing so that the business is not interrupted.
C) The heartbeat interface can be connected directly or through a switch or router.
D) In a dual-machine hot standby network, the heartbeat line is the channel through which two FWs exchange messages to understand the status of the other end and backup configuration commands and various table entries.
Solutions:
Question # 1 Answer: A,B,C,D | Question # 2 Answer: A,B | Question # 3 Answer: B,C,D | Question # 4 Answer: B | Question # 5 Answer: A |