1. Which Huawei security feature helps protect against DoS attacks?
Traffic Anomaly Detection
VPN Tunneling
Firewall NAT
MAC Filtering
Show Answer
✅ Correct Answer: Traffic Anomaly Detection
2. Which protocol is commonly used to encrypt web traffic?
Show Answer
✅ Correct Answer: HTTPS
3. What is the primary function of a firewall?
Filter network traffic
Encrypt data packets
Manage IP addresses
Detect anomalies
Show Answer
✅ Correct Answer: Filter network traffic
4. Which VPN protocol is known for providing secure remote access?
Show Answer
✅ Correct Answer: IPsec
5. Which command is used to view the security policies on a Huawei device?
display security-policy
show firewall rules
ipconfig
display access-list
Show Answer
✅ Correct Answer: display security-policy
6. What does IDS stand for in network security?
Intrusion Detection System
Internet Data Service
Internal Defense System
Infrastructure Delivery Service
Show Answer
✅ Correct Answer: Intrusion Detection System
7. Which type of attack involves sending an overwhelming amount of traffic to disrupt services?
DDoS
Phishing
Spoofing
Brute Force
Show Answer
✅ Correct Answer: DDoS
8. What is the main purpose of MAC filtering?
Restrict network access
Encrypt traffic
Resolve IP addresses
Detect anomalies
Show Answer
✅ Correct Answer: Restrict network access
9. Which layer of the OSI model does a firewall typically operate on?
Network
Transport
Data Link
Physical
Show Answer
✅ Correct Answer: Network
10. Which Huawei feature prevents unauthorized access to network devices?
Access Control Lists
MAC Filtering
Traffic Shaping
DNS Filtering
Show Answer
✅ Correct Answer: Access Control Lists
11. What is the function of IPsec in network security?
Secure data transmission
Detect malware
Manage access control
Monitor traffic logs
Show Answer
✅ Correct Answer: Secure data transmission
12. Which protocol is used for secure remote administration of network devices?
Show Answer
✅ Correct Answer: SSH
13. What is the role of an intrusion prevention system (IPS)?
Block malicious traffic
Monitor access logs
Encrypt data packets
Route network traffic
Show Answer
✅ Correct Answer: Block malicious traffic
14. Which encryption method is commonly used for secure Wi-Fi networks?
Show Answer
✅ Correct Answer: WPA3
15. Which command is used to check active sessions on a Huawei security device?
display session table
show active users
display firewall sessions
netstat -a
Show Answer
✅ Correct Answer: display session table
16. What is the primary benefit of using VLANs for security?
Segmenting network traffic
Encrypting data packets
Speeding up data transfer
Managing IP addresses
Show Answer
✅ Correct Answer: Segmenting network traffic
17. Which tool is used to monitor network traffic on Huawei devices?
Traffic Analyzer
IP Tracker
Network Scanner
Ping Monitor
Show Answer
✅ Correct Answer: Traffic Analyzer
18. Which port does HTTPS typically use?
Show Answer
✅ Correct Answer: 443
19. What is the function of a honeypot in cybersecurity?
Lure attackers to a controlled environment
Encrypt sensitive data
Speed up network traffic
Authenticate users
Show Answer
✅ Correct Answer: Lure attackers to a controlled environment
20. Which protocol is used to synchronize time across network devices?
Show Answer
✅ Correct Answer: NTP
21. Which Huawei feature blocks brute-force attacks?
Login Attempt Lockout
MAC Filtering
VLAN Hopping
STP
Show Answer
✅ Correct Answer: Login Attempt Lockout
22. What is the purpose of a DMZ?
Isolate public-facing servers
Encrypt internal traffic
Filter spam
Monitor logs
Show Answer
✅ Correct Answer: Isolate public-facing servers
23. Which algorithm is used for asymmetric encryption?
Show Answer
✅ Correct Answer: RSA
24. What does SIEM stand for?
Security Information and Event Management
System Intrusion and Encryption Module
Secure Internet Exchange Mechanism
Server Isolation and Event Monitoring
Show Answer
✅ Correct Answer: Security Information and Event Management
25. Which protocol is used for secure file transfers?
Show Answer
✅ Correct Answer: SFTP
26. What is the purpose of a security zone in Huawei firewalls?
Define trust levels for interfaces
Encrypt traffic
Assign IPs
Monitor CPU usage
Show Answer
✅ Correct Answer: Define trust levels for interfaces
27. Which command displays active VPN tunnels?
display ike sa
show vpn status
display ipsec tunnel
netstat -vpn
Show Answer
✅ Correct Answer: display ike sa
28. What is the role of a CASG in Huawei security?
Content and Application Security Gateway
Cloud Access Security Guard
Certified Authorization Service Group
Cybersecurity Audit System Gateway
Show Answer
✅ Correct Answer: Content and Application Security Gateway
29. Which type of firewall inspects packet payloads?
Deep Packet Inspection (DPI)
Packet Filtering
Stateful Inspection
Proxy Firewall
Show Answer
✅ Correct Answer: Deep Packet Inspection (DPI)
30. What is the purpose of a security policy?
Define traffic rules
Encrypt data
Assign VLANs
Monitor logs
Show Answer
✅ Correct Answer: Define traffic rules
31. Which protocol is used for secure email?
Show Answer
✅ Correct Answer: S/MIME
32. What does DDoS mitigation involve?
Filtering malicious traffic
Encrypting packets
Blocking VPNs
Disabling switches
Show Answer
✅ Correct Answer: Filtering malicious traffic
33. Which Huawei product provides endpoint protection?
HiSec Endpoint
FireHunter
USG
CIS
Show Answer
✅ Correct Answer: HiSec Endpoint
34. What is the purpose of a security certificate?
Authenticate identities
Encrypt hard drives
Filter spam
Monitor traffic
Show Answer
✅ Correct Answer: Authenticate identities
35. Which command checks firewall session statistics?
display firewall session table
show security stats
display attack logs
netstat -sec
Show Answer
✅ Correct Answer: display firewall session table
36. What is the function of a WAF?
Protect web applications
Encrypt emails
Filter LAN traffic
Block USB devices
Show Answer
✅ Correct Answer: Protect web applications
37. Which protocol is used for RADIUS authentication?
Show Answer
✅ Correct Answer: UDP
38. What is the purpose of a sandbox in security?
Analyze malware safely
Encrypt backups
Filter DNS queries
Monitor switches
Show Answer
✅ Correct Answer: Analyze malware safely
39. Which Huawei feature detects advanced threats?
FireHunter
USG
HiSec Insight
CIS
Show Answer
✅ Correct Answer: FireHunter
40. What is the role of a KMS in encryption?
Manage cryptographic keys
Monitor logs
Filter packets
Authenticate users
Show Answer
✅ Correct Answer: Manage cryptographic keys
41. Which command exports Huawei firewall logs?
export logfile
save logs
display log export
copy log
Show Answer
✅ Correct Answer: export logfile
42. What is the purpose of a security baseline?
Define minimum security standards
Encrypt traffic
Assign IPs
Monitor CPU
Show Answer
✅ Correct Answer: Define minimum security standards
43. Which protocol is used for LDAP security?
Show Answer
✅ Correct Answer: SSL/TLS
44. What does Zero Trust security enforce?
Verify all access requests
Block all traffic
Disable encryption
Allow all internal traffic
Show Answer
✅ Correct Answer: Verify all access requests
45. Which Huawei tool provides centralized security management?
eSight
FusionSphere
OceanStor
HiSec Manager
Show Answer
✅ Correct Answer: eSight