최신 HCIE-Security H12-731_V2.0 무료샘플문제:
1. If the attacker uses a fake address to launch a TCP flood attack Which of the following defenses is most effective? (single).
A) Source verification
B) Load inspection
C) Session checking
D) Fingerprint learning
2. Which of the following devices can work with situational awareness to isolate infected hosts? (single selection).
A) SecoManager
B) EDR
C) Agile-controller Campus
D) gile-controller DCN
3. Digital signature technology can guarantee the credibility of the data source and verify whether the data has been tampered with during transmission. (Single selection)
A) TRUE
B) FALSE
4. The following description of the IPv6 stateless address DAD check, which one is wrong? (single selection).
A) The node sends a Neighbor Request (NS) packet to the test address it will use If you receive a Neighbor Notification (NA) message from another site then proves that the address has already been used.
B) When the interface is configured as an IPv6 address , DAD is used to detect whether the IPv6 address to be used is unique within the local link.
C) The test address enables broadcast communication.
D) IPv6 duplicate address detection technology is similar to free ARP in IPv4 Used to detect duplicate IPv4 host addresses when the address is divided into IE or when the host is connected to the network.
5. Hypothetical has a set of raw data as follows: .10, 20. 30. 40, 50" The set of data was desensitized by randomly swapping the position of the data, and the desensitized data was: .30 20. 50. 10. 40\Which of the following algorithms is used in this data masking method? (single selection).
A) Change
B) AV hash
C) Noise
D) Load break
질문과 대답:
질문 # 1 정답: A | 질문 # 2 정답: C | 질문 # 3 정답: A | 질문 # 4 정답: C | 질문 # 5 정답: A |