Pass the Huawei HCIP-Security H12-722 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.

Note to the original link, which of the following options does not belong to the method of re-injection?

Options:

A.

Policy routing back annotation,


B.

GRE back note:


C.

MPLS LSP back injection


D.

BGP back-annotation


Expert Solution
Questions # 12:

Regarding the description of keywords, which of the following is correct? (multiple choice)

Options:

A.

Keywords are the content that the device needs to recognize during content filtering.


B.

Keywords include predefined keywords and custom keywords.


C.

The minimum length of the keyword that the text can match is 2 bytes. ,


D.

Custom keywords can only be defined in text mode.


Expert Solution
Questions # 13:

Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?

1. The Netflow analysis device samples the current network flow;

2. Send a drainage command to the cleaning center;

3. Discover the DDoS attack stream;

4.Netior: analysis equipment sends alarms to ATIC management center

5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;

6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage

7. The cleaning log is sent to the management center to generate a report;

8. The cleaned traffic is sent to the original destination server.

Options:

A.

1-3-4-2-5-6-7-8


B.

1-3-2-4-6-5-7-8


C.

1-3-4-2-6-5-8-7


D.

1-3-24-6-5-8-7


Expert Solution
Questions # 14:

The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.

Options:

A.

True


B.

False


Expert Solution
Questions # 15:

For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?

Options:

A.

Cannot control the number of received email attachments


B.

When the spam processing action is an alert, the email will be blocked and an alert will be generated


C.

You can control the size of the attachment of the received mail


D.

Cannot perform keyword filtering on incoming mail


Expert Solution
Questions # 16:

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.

Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?

Options:

A.

TCP packets


B.

UDP packet


C.

ICMP message


D.

FTP message


Expert Solution
Questions # 17:

In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.

And development. Which of the following key points should be done in "things"? (multiple choice)

Options:

A.

Vulnerability intelligence


B.

Defense in Depth


C.

Offensive and defensive situation


D.

Fight back against hackers

155955cc-666171a2-20fac832-0c042c045


Expert Solution
Questions # 18:

Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)

A ICMP protocol

B. UDP protocol

C. CIP protocol

D. FTP protocol


Expert Solution
Questions # 19:

Which of the following attacks are attacks against web servers? (multiple choices)

Options:

A.

Website phishing deception


B.

Website Trojan


C.

SQL injection


D.

Cross-site scripting attacks 2335


Expert Solution
Questions # 20:

Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device

Collect it in the log for continuous learning and optimization.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0433


B.

False


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions