Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H12-722 Sample Questions Answers

Questions 4

Regarding Huawei's anti-virus technology, which of the following statements is wrong?

Options:

A.

The virus detection system cannot directly detect compressed files

B.

The anti-virus engine can detect the file type through the file extension

C.

Gateway antivirus default file maximum decompression layer is 3 layers

D.

The implementation of gateway antivirus is based on proxy scanning and stream scanning

Buy Now
Questions 5

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

Options:

A.

③④

B.

①③④

C.

⑤⑥

D.

②④

Buy Now
Questions 6

Which of the following is the correct configuration idea for the anti-virus strategy?

1. Load the feature library

2. Configure security policy and reference AV Profile

3. Apply and activate the license

4. Configure AV Profile

5. Submit

Options:

A.

3->1->4->2->5

B.

3->2->4->1->5

C.

3->2->1->4->5

D.

3->1->2->4->5

Buy Now
Questions 7

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

Options:

A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Buy Now
Questions 8

Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?

Options:

A.

Ordinary attacks will usually be cleaned locally first.

B.

If there is a large traffic attack on the network, send it to the cloud cleaning center to share the cleaning pressure.

C.

Since the Cloud Cleaning Alliance will direct larger attack flows to the cloud for cleaning, it will cause network congestion.

D.

The closer to the attacked self-labeled cloud cleaning service, the priority will be called.

155955cc-666171a2-20fac832-0c042c0430

Buy Now
Questions 9

Huawei's USG000 product can identify the true type of common files and over-check the content. Even if the file is hidden in a compressed file, or change the extension

The name of the exhibition can't escape the fiery eyes of the firewall.

Options:

A.

True

B.

False

Buy Now
Questions 10

When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.

Options:

A.

True

B.

False

Buy Now
Questions 11

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

Options:

A.

IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.

B.

It is impossible to correctly analyze the malicious code doped in the allowed application data stream.

C.

Unable to detect malicious operations or misoperations from internal killings.

D.

Cannot do in-depth inspection

Buy Now
Questions 12

Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

Options:

A.

It cannot effectively prevent the virus from spreading from the Internet to the intranet.

B.

The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services

Experience.

C.

Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.

D.

Ability to quickly adapt to threat changes

Buy Now
Questions 13

Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?

Options:

A.

display version av-sdb

B.

display utm av version

C.

display av utm version

D.

display utm version

Buy Now
Questions 14

When a virus is detected in an email, which of the following is not the corresponding action for detection?

Options:

A.

Warning

B.

Block

C.

Declare

D.

Delete attachments

Buy Now
Questions 15

After the user deploys the firewall anti-virus strategy, there is no need to deploy anti-virus software

Options:

A.

True

B.

False.

Buy Now
Questions 16

Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main

Which four major components are included?

Options:

A.

Event extraction, intrusion analysis, reverse intrusion and remote management.

B.

Incident extraction, intrusion analysis, intrusion response and on-site management.

C.

Incident recording, intrusion analysis, intrusion response and remote management.

D.

Incident extraction, intrusion analysis, intrusion response and remote management.

Buy Now
Questions 17

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system

If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)

Options:

A.

Host

B.

A group of users

C.

Single user

D.

A key program and file in the system

Buy Now
Questions 18

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed

In the high-performance engine. Which of the following is not the content security detection function supported by this product?

Options:

A.

Application recognition and perception

B.

URL classification and filtering

C.

Video content filtering

D.

Intrusion prevention

155955cc-666171a2-20fac832-0c042c048

Buy Now
Questions 19

Which of the following options are common reasons for IPS detection failure? (multiple choices)

Options:

A.

IPS policy is not submitted for compilation

B.

False Policy IDs are associated with IPS policy domains

C.

The IPS function is not turned on

D.

Bypass function is closed in IPS

Buy Now
Questions 20

If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses

It is the stream scanning method.

Options:

A.

True

B.

False

Buy Now
Questions 21

Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition

Contains content, the device can block or alert traffic containing specific keywords.

Options:

A.

True

B.

False

Buy Now
Questions 22

What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)

Options:

A.

Keywords contained in the content of the uploaded file

B.

Keywords contained in the downloaded file

C.

File type

D.

File upload direction 335

Buy Now
Questions 23

Use BGP protocol to achieve diversion, the configuration command is as follows

[sysname] route-policy 1 permit node 1

[sysname-route-policy] apply community no-advertise

[sysname-route-policy] quit

[sysname]bgp100

155955cc-666171a2-20fac832-0c042c04

29

[sysname-bgp] peer

[sysname-bgp] import-route unr

[sysname- bgpl ipv4-family unicast

[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export

[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community

[sysname-bgp-af-ipv4] quit

[sysname-bgp]quit

Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)

Options:

A.

Use BGP to publish UNR routes to achieve dynamic diversion.

B.

After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.

C.

You also need to configure the firewall ddos ​​bgp-next-hop fib-filter command to implement back-injection.

D.

The management center does not need to configure protection objects. When an attack is discovered, it automatically issues a traffic diversion task.

Buy Now
Questions 24

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

Options:

A.

The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source

B.

For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify

The legitimacy of the source IP.

C.

In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process

It will consume the TCP connection resources of the OINS cache server.

D.

Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Buy Now
Questions 25

Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers

A lot of time to research and analyze and produce corresponding defense methods.

Options:

A.

True

B.

False

Buy Now
Questions 26

For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?

Options:

A.

TCP proxy means that the firewall is deployed between the client and the server. When the SYI packet sent by the client to the server passes through the firewall, the

The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.

B.

During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is

When the document flow is heavy, the performance requirements of the firewall are often high.

C.

TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233

D.

TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.

Buy Now
Exam Code: H12-722
Exam Name: Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)
Last Update: Apr 24, 2024
Questions: 177
$64  $159.99
$48  $119.99
$40  $99.99
buy now H12-722