Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0) H12-722 Question # 53 Topic 6 Discussion

Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0) H12-722 Question # 53 Topic 6 Discussion

H12-722 Exam Topic 6 Question 53 Discussion:
Question #: 53
Topic #: 6

For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?


A.

TCP proxy means that the firewall is deployed between the client and the server. When the SYI packet sent by the client to the server passes through the firewall, the

The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.


B.

During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is

When the document flow is heavy, the performance requirements of the firewall are often high.


C.

TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233


D.

TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.


Get Premium H12-722 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.