Pass the Huawei HCIP-Security H12-722 Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

Options:

A.

Data analysis, data classification, post-processing


B.

Data processing, data classification, post-processing


C.

Data processing, attack classification, post-processing


D.

Data processing, data classification, attack playback


Expert Solution
Questions # 32:

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

Options:

A.

True


B.

False


Expert Solution
Questions # 33:

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

Options:

A.

Planting malware


B.

Vulnerability attack"


C.

We6 Application Click


D.

Brute force


Expert Solution
Questions # 34:

Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?

Options:

A.

display version av-sdb


B.

display utm av version


C.

display av utm version


D.

display utm version


Expert Solution
Questions # 35:

Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.

Wen attack.

Options:

A.

True


B.

False


Expert Solution
Questions # 36:

Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)

Options:

A.

Infrastructure security


B.

Tenant security


C.

How to do a good job in management, operation and maintenance


D.

Hardware maintenance


Expert Solution
Questions # 37:

Use BGP protocol to achieve diversion, the configuration command is as follows

[sysname] route-policy 1 permit node 1

[sysname-route-policy] apply community no-advertise

[sysname-route-policy] quit

[sysname]bgp100

155955cc-666171a2-20fac832-0c042c04

29

[sysname-bgp] peer

[sysname-bgp] import-route unr

[sysname- bgpl ipv4-family unicast

[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export

[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community

[sysname-bgp-af-ipv4] quit

[sysname-bgp]quit

Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)

Options:

A.

Use BGP to publish UNR routes to achieve dynamic diversion.


B.

After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.


C.

You also need to configure the firewall ddos ​​bgp-next-hop fib-filter command to implement back-injection.


D.

The management center does not need to configure protection objects. When an attack is discovered, it automatically issues a traffic diversion task.


Expert Solution
Questions # 38:

Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)

Options:

A.

Virtual patch


B.

Mail detection


C.

SSL traffic detection


D.

Application identification and control


Expert Solution
Questions # 39:

Regarding worms and viruses, which of the following statements is correct?

Options:

A.

Worms exist in a parasitic way

155955cc-666171a2-20fac832-0c042c0413


B.

Viruses mainly rely on system vulnerabilities to spread


C.

The target of the worm infection is other computer systems on the network.


D.

The virus exists independently in the computer system.


Expert Solution
Questions # 40:

The configuration command to enable the attack prevention function is as follows; n

[FW] anti-ddos syn-flood source-detect

[FW] anti-ddos udp-flood dynamic-fingerprint-learn

[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn

[FW] anti-ddos http-flood defend alert-rate 2000

[Fwj anti-ddos htp-flood source-detect mode basic

Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)

Options:

A.

The firewall has enabled the SYN Flood source detection and defense function


B.

The firewall uses the first packet drop to defend against UDP Flood attacks.


C.

HTTP Flood attack defense uses enhanced mode for defense


D.

The threshold for HTTP Flood defense activation is 2000.


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions