Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 10 out of 11 pages
Viewing questions 91-100 out of questions
Questions # 91:

Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.

Options:

A.

True


B.

False


Expert Solution
Questions # 92:

The configuration command to enable the attack prevention function is as follows; n

[FW] anti-ddos syn-flood source-detect

[FW] anti-ddos udp-flood dynamic-fingerprint-learn

[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn

[FW] anti-ddos http-flood defend alert-rate 2000

[Fwj anti-ddos htp-flood source-detect mode basic

Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)

Options:

A.

The firewall has enabled the SYN Flood source detection and defense function


B.

The firewall uses the first packet drop to defend against UDP Flood attacks.


C.

HTTP Flood attack defense uses enhanced mode for defense


D.

The threshold for HTTP Flood defense activation is 2000.


Expert Solution
Questions # 93:

Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black

Whitelist and other configuration files.

A True

B. False


Expert Solution
Questions # 94:

USG6000V software logic architecture is divided into three planes: management plane, control plane and

Options:

A.

Configuration plane


B.

Business plane


C.

Log plane


D.

Data forwarding plane


Expert Solution
Questions # 95:

An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?

Options:

A.

Centralized deployment


B.

Distributed deployment


C.

Hierarchical deployment


D.

Both centralized deployment and distributed deployment are possible


Expert Solution
Questions # 96:

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

Options:

A.

Check for prohibited software licenses and sub-licensed software


B.

Check for prohibited software


C.

Check for prohibited software and software that must be installed


D.

Check the software that must be installed


Expert Solution
Questions # 97:

Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.

Options:

A.

True


B.

False


Expert Solution
Questions # 98:

What content can be filtered by the content filtering technology of Huawei USG6000 products? (multiple choice)

Options:

A.

Keywords contained in the content of the uploaded file


B.

Keywords contained in the downloaded file


C.

File type


D.

File upload direction 335


Expert Solution
Questions # 99:

The following figure is a schematic diagram of the detection file of the firewall and the sandbox system linkage.

Question # 99

The Web reputation function is enabled on the firewall, and website A is set as a trusted website and website B is set as a suspicious website.

Which of the following statements is correct

Options:

A.

The files obtained by users from website A and website B will be sent to the inspection node for inspection.


B.

When a user visits website B, although the firewall will extract the file and send it to the detection node, the user can still access normally during the detection process

Site B.


C.

After the detection node detects the suspicious file, it not only informs the firewall in the figure of the result, but also informs other network devices connected to it.


D.

Assuming that website A is an unknown website, the administrator cannot detect the traffic file of this website sC


Expert Solution
Questions # 100:

In the terminal host check strategy, you can check whether the important subkeys and key values ​​of the registry meet the requirements to control the terminal host's Access, which of the following check results will be recorded as violations? (multiple choice)

Options:

A.

The registry does not contain the mandatory requirements of the policy"Subkeys and key values".


B.

The registry contains the mandatory requirements of the policy"Subkeys and key values",


C.

The registry contains the prohibited"Subkeys and key values"W


D.

The registry does not contain any prohibited by this policy"Subkeys and key values"


Expert Solution
Viewing page 10 out of 11 pages
Viewing questions 91-100 out of questions