Pass the Huawei HCIP-Security H12-722_V3.0 Questions and answers with CertsForce

Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions
Questions # 21:

Regarding the mail content filtering configuration of Huawei USG6000 products, which of the following statements is wrong?.

Options:

A.

Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.


B.

When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o


C.

When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.


D.

The attachment size limit is for a single attachment, not for the total size of all attachments.


Expert Solution
Questions # 22:

The configuration command to enable the attack prevention function is as follows; n

[FW] anti-ddos syn-flood source-detect

[FW] anti-ddos udp-flood dynamic-fingerprint-learn

[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn

[FW] anti-ddos http-flood defend alert-rate 2000

[Fwj anti-ddos htp-flood source-detect mode basic

Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)

Options:

A.

The firewall has enabled the SYN Flood source detection and defense function


B.

The firewall uses the first packet drop to defend against UDP Flood attacks.


C.

HTTP Flood attack defense uses enhanced mode for defense


D.

The threshold for HTTP Flood defense activation is 2000.


Expert Solution
Questions # 23:

For compressed files, the virus detection system can directly detect them.

Options:

A.

True


B.

False


Expert Solution
Questions # 24:

Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main

Which four major components are included?

Options:

A.

Event extraction, intrusion analysis, reverse intrusion and remote management.


B.

Incident extraction, intrusion analysis, intrusion response and on-site management.


C.

Incident recording, intrusion analysis, intrusion response and remote management.


D.

Incident extraction, intrusion analysis, intrusion response and remote management.


Expert Solution
Questions # 25:

Which of the following options belong to the keyword matching mode? (multiple choice)

Options:

A.

Text


B.

Regular expressions


C.

Community word


D.

Custom keywords


Expert Solution
Questions # 26:

If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses

It is the stream scanning method.

Options:

A.

True


B.

False


Expert Solution
Questions # 27:

What content can be filtered by the content filtering technology of Huawei USG6000 products?

Options:

A.

File content filtering


B.

Voice content filtering


C.

Apply content filtering..


D.

The source of the video content


Expert Solution
Questions # 28:

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed

In the high-performance engine. Which of the following is not the content security detection function supported by this product?

Options:

A.

Application recognition and perception


B.

URL classification and filtering


C.

Video content filtering


D.

Intrusion prevention

155955cc-666171a2-20fac832-0c042c048


Expert Solution
Questions # 29:

Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)

Options:

A.

The detection rate is higher than the flow scanning method


B.

System overhead will be relatively small


C.

Cache all files through the gateway's own protocol stack


D.

More advanced operations such as decompression, shelling, etc. can be performed


Expert Solution
Questions # 30:

Regarding computer viruses, which of the following options is correct?

Options:

A.

Patching the system can completely solve the virus intrusion problem


B.

Computer viruses are latent, they may be latent for a long time, and only when they encounter certain conditions will they begin to carry out sabotage activities


C.

Computer viruses are contagious. They can spread through floppy disks and CDs, but they will not spread through the Internet.


D.

All computer viruses must be parasitic in files and cannot exist independently


Expert Solution
Viewing page 3 out of 6 pages
Viewing questions 21-30 out of questions