Pass the Huawei HCIP-Security H12-722_V3.0 Questions and answers with CertsForce

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 52:

Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device

Collect it in the log for continuous learning and optimization.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0433


B.

False


Expert Solution
Questions # 53:

In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc.

do. Which of the following options does not belong to the action that needs to be completed in the data processing part?

155955cc-666171a2-20fac832-0c042c0422

Options:

A.

Data preprocessing


B.

Threat determination


C.

Distributed storage


D.

Distributed index


Expert Solution
Questions # 54:

Place refers to the terminal environment when end-user use strategy management center access to

controlled network office, which options are correct about place? (Choose 2 answers)

Options:

A.

strategy management center only support the default place


B.

The default place only support by way of cable access network scenario


C.

can be customized places


D.

when allocation strategy template for the end user, need to select the corresponding places


Expert Solution
Questions # 55:

With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.

Generally, APT attacks can be summarized into four stages:

1. Collecting Information & Intrusion

2. Long-term lurking & mining

3. Data breach

4. Remote control and penetration

Regarding the order of these four stages, which of the following options is correct?

Options:

A.

2-3-4-1


B.

1-2-4-3


C.

1-4-2-3


D.

2-1-4-3


Expert Solution
Questions # 56:

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

Options:

A.

htttp://www.abcd. com:8080/news/education. aspx


B.

htttp://www.abcd. com:8080,te


C.

/news/education. aspx


D.

/news/education. aspx?name=tom&age=20


Expert Solution
Questions # 57:

Anti-DDoS defense system includes: management center, detection center and cleaning center.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0421


B.

False


Expert Solution
Questions # 58:

Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?

Options:

A.

Local reputation MD5 cache only has static cache, which needs to be updated regularly


B.

File reputation database can only be upgraded by manual upgrade


C.

File reputation is to perform virus detection by calculating the full text MD5 of the file to be tested and matching it with the local reputation MD5 cache


D.

File reputation database update and upgrade can only be achieved through linkage with sandbox


Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions