Pass the Huawei HCIP-Security H12-722_V3.0 Questions and answers with CertsForce

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Regarding HTTP behavior, which of the following statements is wrong?

Options:

A.

HTTP POST is generally used to send information to the server through a web page, such as forum posting x form submission, username I password login.


B.

When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.


C.

When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management

And block behavior.


D.

When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST

operate.


Expert Solution
Questions # 12:

Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.

Wen attack.

Options:

A.

True


B.

False


Expert Solution
Questions # 13:

Which patches does Policy Center support to management?(Choose 3 answers)

Options:

A.

Microsoft Windows operating system patches


B.

Microsoft SQL Windows database patch


C.

Microsoft Internet Explorer patches


D.

android system patches


Expert Solution
Questions # 14:

Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules

To detect intrusions in the system. Which of the following is not a feature of misuse detection 2

Options:

A.

Easy to implement


B.

Accurate detection


C.

Effective detection of impersonation detection of legitimate users


D.

Easy to upgrade


Expert Solution
Questions # 15:

The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined

The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are

Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?

Options:

A.

The weight value is 8, you can visit the web page


B.

The weight value is 10, and the page cannot be accessed


C.

The weight value is 8, the page cannot be accessed


D.

The weight value is 10, you can ask the web page before


Expert Solution
Questions # 16:

When configuring the terminal visits, we put some equipment configured exception equipment ,which of the following statements are true about the exception equipment?

Options:

A.

the exception equipment IP is not in controlled network segment.


B.

terminal in isolation domain can not access exception equipment .


C.

only through security authentication terminals can access exception equipment.


D.

through identity authentication terminals can access exception equipment.


Expert Solution
Questions # 17:

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

Options:

A.

Enhanced mode refers to the authentication method using verification code.


B.

Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense

Effective, enhanced mode can effectively defend.


C.

The enhanced mode is superior to the basic mode in terms of user experience.


D.

Enhanced mode supports all HTTP Flood source authentication fields. "

WWQQ: 922333


Expert Solution
Questions # 18:

For the basic mode of HTTP Flood source authentication, which of the following options are correct? (multiple choice)

Options:

A.

The basic mode can effectively block the access from the Feng Explor client.


B.

The bot tool does not implement a complete HTTP protocol stack and does not support automatic redirection, so the basic mode can effectively defend against HTTP Flood attacks.

hit.


C.

When there is an HTTP proxy server in the network, the firewall will add the IP address of the proxy server to the whitelist, but it will recognize the basic source of the zombie host.

The certificate is still valid.


D.

The basic mode will not affect the user experience, so the defense effect is higher than the enhanced mode.


Expert Solution
Questions # 19:

Which of the following options is not a special message attack?

Options:

A.

ICMP redirect message attack) 0l


B.

Oversized ICMP packet attack


C.

Tracert packet attack


D.

IP fragment message item


Expert Solution
Questions # 20:

Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers

A lot of time to research and analyze and produce corresponding defense methods.

Options:

A.

True


B.

False


Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions