Pass the Huawei HCIP-Security H12-722_V3.0 Questions and answers with CertsForce

Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?

Options:

A.

Virus


B.

Buffer overflow ρ


C.

System vulnerabilities


D.

Port scan


Expert Solution
Questions # 32:

Which of the following technologies can achieve content security? (multiple choice)

Options:

A.

Web security protection


B.

Global environment awareness


C.

Sandbox and big data analysis


D.

Intrusion prevention


Expert Solution
Questions # 33:

Regarding firewall and IDS, which of the following statements is correct?

Options:

A.

The firewall is a bypass device, used for fine-grained detection


B.

IDS is a straight line equipment and cannot be used for in-depth inspection


C.

The firewall cannot detect malicious operations or misoperations by insiders


D.

IDS cannot be linked with firewall


Expert Solution
Questions # 34:

The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.

Options:

A.

True


B.

False


Expert Solution
Questions # 35:

Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)

Options:

A.

Infrastructure security


B.

Tenant security


C.

How to do a good job in management, operation and maintenance


D.

Hardware maintenance


Expert Solution
Questions # 36:

In order to protect the security of data transmission, more and more websites or companies choose to use SSL to encrypt transmissions in the stream. About using Huawei NIP6000

The product performs threat detection on (SSL stream boy, which of the following statements is correct?

Options:

A.

NIP0OO does not support SSL Threat Detection.


B.

The traffic after threat detection is sent directly to the server without encryption


C.

NIP can directly crack and detect SSL encryption.


D.

After the process of "decryption", "threat detection", and "encryption"


Expert Solution
Questions # 37:

Which of the following files can the sandbox detect? (multiple choice)

Options:

A.

www file


B.

PE file


C.

Picture file


D.

Mail


Expert Solution
Questions # 38:

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

Options:

A.

True


B.

False


Expert Solution
Questions # 39:

Which of the following types of attacks are DDoS attacks? 2I

Options:

A.

Single packet attack


B.

Floating child attack


C.

Malformed message attack


D.

Snooping scan attack


Expert Solution
Questions # 40:

Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?

1. The Netflow analysis device samples the current network flow;

2. Send a drainage command to the cleaning center;

3. Discover the DDoS attack stream;

4.Netior: analysis equipment sends alarms to ATIC management center

5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;

6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage

7. The cleaning log is sent to the management center to generate a report;

8. The cleaned traffic is sent to the original destination server.

Options:

A.

1-3-4-2-5-6-7-8


B.

1-3-2-4-6-5-7-8


C.

1-3-4-2-6-5-8-7


D.

1-3-24-6-5-8-7


Expert Solution
Viewing page 4 out of 6 pages
Viewing questions 31-40 out of questions