Pass the Huawei HCIP-Security H12-722 Questions and answers with CertsForce

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.

Signs: The workflow for the WAF tamper-proof module has the following steps:.

① WAF uses the pages in the cache to return to the client;

②WAF compares the watermark of the server page content with the page content in the cache

③Store the content of the page in the cache after learning

④ When the user accesses the Web page, the WAF obtains the page content of the server

⑤WAF starts the learning mode to learn the page content of the user's visit to the website;

For the ordering of these steps, which of the following options is correct?

Options:

A.

③④②⑤①


B.

⑤①②④③


C.

②④①⑤③


D.

⑤③④②①


Questions # 2:

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

Options:

A.

Lack of effective protection against application layer threats.


B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.


C.

Ability to quickly adapt to changes in threats.


D.

Unable to accurately control various applications, such as P2P, online games, etc. .


Questions # 3:

Which of the following are typical intrusions? "Multiple choice)

Options:

A.

Computer is infected by U disk virus


B.

Abnormal power interruption in the computer room


C.

Tampering with Web pages


D.

Copy/view sensitive data


Questions # 4:

Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?

Options:

A.

It can identify the application that carries the file, the file transfer direction, the file type and the file extension.


B.

Even if the file type is modified, it can also identify the true type of the file


C.

It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.


D.

It supports filtering the contents of compressed files after decompression. "


Questions # 5:

When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.

Options:

A.

True


B.

False


Questions # 6:

Anti-DDoS defense system includes: management center, detection center and cleaning center.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0421


B.

False


Questions # 7:

If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses

It is the stream scanning method.

Options:

A.

True


B.

False


Questions # 8:

Regarding the anti-spam local black and white list, which of the following statements is wrong?

Options:

A.

The black and white list is matched by extracting the destination IP address of the SMTP connection


B.

The black and white list is matched by the sender's dns suffix


C.

The black and white list is matched by extracting the source IP address of the SMTP connection

155955cc-666171a2-20fac832-0c042c0419


D.

If the source IP address of the SMTP connection matches the blacklist, the connection will be blocked


Questions # 9:

Which of the following options is not a cyber security threat caused by weak personal security awareness?

Options:

A.

Disclosure of personal information


B.

Threats to the internal network


C.

Leaking corporate information


D.

Increasing the cost of enterprise network operation and maintenance


Questions # 10:

When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)

Options:

A.

Warning


B.

Block


C.

Declare


D.

Operate by weight


Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions