HCNA-Security

Page 1

Huawei HCNA HCIA security main  exam for certification. It cover all Levels in Huawei Exams. It comprises both questions and answers. Learn and share the knowledge out there with your family, colleagues, friends and workmates.

Regarding the description of windows log event types, which options are correct? (Multiple choices)
A. Warning events are events for the successful operation of an application, driver, or service.
B. Error events usually refer to loss of functionality and data. For example, if a service cannot be loaded as a
system boot, an error event is generated.
C. When disk space is low, it will be recorded as an “information event”
D. Failure audit event refers to a failed audit of a secure login attempt, such as a failure when the user view
accesses a network drive, and it is recorded as a failure
Audit events.
Correct Answer: BCD
Section: (none)
Explanation
Explanation / Reference:


QUESTION 2
Which of the following types of encryption technology can be classified? (Multiple choices)
A. Symmetric encryption
B. Symmetric encryption
C. Fingerprint encryption
D. Data encryption
Correct Answer: AB
Section: (none)
Explanation
Explanation / Reference:
QUESTION 3
Which of the following state information can be backed up by Huawei Redundancy Protocol (HRP)? (Multiple
choices)
A. Session table
B. ServerMap entry
C. Dynamic blacklist
D. Routing table
Correct Answer: ABC

Page 2

Exam A

QUESTION 1

Regarding the description of windows log event types, which options are correct? (Multiple choices)

  1. Warning events are events for the successful operation of an application, driver, or service.
  2. Error events usually refer to loss of functionality and data. For example, if a service cannot be loaded as a system boot, an error event is generated.
  3. When disk space is low, it will be recorded as an “information event”
  4. Failure audit event refers to a failed audit of a secure login attempt, such as a failure when the user view accesses a network drive, and it is recorded as a failure

Audit events.

Correct Answer: 2,3,4

Section: (none)

Explanation

Explanation / Reference:

QUESTION 2


Which of the following types of encryption technology can be classified? (Multiple choices)

  1. Symmetric encryption
  2. Symmetric encryption
  3. Fingerprint encryption
  4. Data encryption

Correct Answer: 1,2

Section: (none)

Explanation

Explanation / Reference:

QUESTION 3

Which of the following state information can be backed up by Huawei Redundancy Protocol (HRP)? (Multiple choices)

  1. Session table
  2. ServerMap entry
  3. Dynamic blacklist
  4. Routing table

Correct Answer: 1,2,3

Section: (none)

Explanation

Explanation / Reference:

QUESTION 4

Which of the following is a core part of the P2DR model?

  1. Policy
  2. Protection
  3. Detection
  4. Response
Page 3

Correct Answer: 1

Section: (none)

Explanation

Explanation / Reference: