Pass the Huawei HCIP-Security H12-722_V3.0 Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.

Options:

A.

True


B.

False


Expert Solution
Questions # 42:

Which of the following options is not a feature of big data technology?

Options:

A.

The data boy is huge


B.

A wide variety of data


C.

Low value density


D.

Slow processing speed


Expert Solution
Questions # 43:

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.

Signs: The workflow for the WAF tamper-proof module has the following steps:.

① WAF uses the pages in the cache to return to the client;

②WAF compares the watermark of the server page content with the page content in the cache

③Store the content of the page in the cache after learning

④ When the user accesses the Web page, the WAF obtains the page content of the server

⑤WAF starts the learning mode to learn the page content of the user's visit to the website;

For the ordering of these steps, which of the following options is correct?

Options:

A.

③④②⑤①


B.

⑤①②④③


C.

②④①⑤③


D.

⑤③④②①


Expert Solution
Questions # 44:

Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.

Options:

A.

True


B.

False


Expert Solution
Questions # 45:

If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

Options:

A.

Block


B.

Declare


C.

Alarm


D.

Execution


Expert Solution
Questions # 46:

Which of the following iterations is correct for the description of the management center?

Options:

A.

The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary

The stream is reported to the management server for report presentation.


B.

The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.


C.

The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.


D.

The management center is divided into two parts: management server and teaching data collector.


Expert Solution
Questions # 47:

Which of the following attacks are attacks against web servers? (multiple choices)

Options:

A.

Website phishing deception


B.

Website Trojan


C.

SQL injection


D.

Cross-site scripting attacks 2335


Expert Solution
Questions # 48:

Which of the following behaviors is a false positive of the intrusion detection system?

Options:

A.

Unable to detect new types of worms


B.

The process of trying to log in to the system is recorded


C.

Use Ping to perform network detection and be alerted as an attack


D.

Web-based attacks are not detected by the system


Expert Solution
Questions # 49:

Which of the following statement on the scanner is wrong?

Options:

A.

When deploying NAC Agent, can use scanner to scan and assess the number of installed and non-installed agent.


B.

When the terminal NAC Agent uninstall, the scanner can send alarm information.


C.

the scanner by the SNMP protocol to obtain network equipment resources information.


D.

scanner and Policy Center controller linkage scan tasks.


Expert Solution
Questions # 50:

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

Options:

A.

Lack of effective protection against application layer threats.


B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.


C.

Ability to quickly adapt to changes in threats.


D.

Unable to accurately control various applications, such as P2P, online games, etc. .


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions