Pass the Huawei HCIP-Security H12-722 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following signature attributes cannot be configured for IP custom signature?

Options:

A.

ID


B.

Message length


C.

Agreement


D.

Direction


Expert Solution
Questions # 42:

Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.

Options:

A.

True


B.

False


Expert Solution
Questions # 43:

IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.

Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?

Options:

A.

IPS is an intrusion detection system that can block real-time intrusions when found


B.

IPS unifies IDS and firewall


C.

IPS must use bypass deployment in the network


D.

Common IPS deployment modes are in-line deployment,


Expert Solution
Questions # 44:

Which of the following threats cannot be detected by IPS?

Options:

A.

Virus


B.

Worms


C.

Spam


D.

DoS


Expert Solution
Questions # 45:

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

Options:

A.

Long-term latency and collection of key data.


B.

Leak the acquired key data information to a third party of interest

155955cc-666171a2-20fac832-0c042c044


C.

Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.


D.

The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.


Expert Solution
Questions # 46:

Which of the following files can the sandbox detect? (multiple choice)

Options:

A.

www file


B.

PE file


C.

Picture file


D.

Mail


Expert Solution
Questions # 47:

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

Question # 47

Options:

A.

③④


B.

①③④


C.

⑤⑥


D.

②④


Expert Solution
Questions # 48:

The status code in the HTTP response message indicates the type of the response message, and there are many possible values. Which of the following status codes represents the client request

The resource does not exist?

Options:

A.

400.


B.

404


C.

200


D.

503


Expert Solution
Questions # 49:

Which of the following behaviors is a false positive of the intrusion detection system?

Options:

A.

Unable to detect new types of worms


B.

The process of trying to log in to the system is recorded


C.

Use Ping to perform network detection and be alerted as an attack


D.

Web-based attacks are not detected by the system


Expert Solution
Questions # 50:

Which of the following options is not a defense against HTTP Flood attacks?

Options:

A.

HTTP Flood source authentication


B.

HTTP source statistics


C.

URI source fingerprint learning function


D.

Baseline learning


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions