Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Regarding HTTP behavior, which of the following statements is wrong?

Options:

A.

HTTP POST is generally used to send information to the server through a web page, such as forum posting x form submission, username I password login.


B.

When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.


C.

When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management

And block behavior.


D.

When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST

operate.


Expert Solution
Questions # 22:

​​SQl injection attacks generally have the following steps:

①Elevate the right

②Get the data in the database

③Determine whether there are loopholes in the webpage

④ Determine the database type

For the ordering of these steps, which of the following options is correct?

Options:

A.

③④①②


B.

③④②①


C.

④①②③


D.

④②①③


Expert Solution
Questions # 23:

Regarding the description of intrusion detection technology, which of the following statements is correct?

Options:

A.

It is impossible to detect violations of security policies.


B.

It can detect all kinds of authorized and unauthorized intrusions.


C.

Unable to find traces of the system being attacked.


D.

is an active and static security defense technology.

155955cc-666171a2-20fac832-0c042c0425


Expert Solution
Questions # 24:

Agile Controller-Campus Which deployment mode is not supported?

Options:

A.

Centralized deployment


B.

Distributed deployment


C.

Hierarchical deployment


D.

Two-machine deployment


Expert Solution
Questions # 25:

Which of the following options are common reasons for IPS detection failure? (multiple choices)

Options:

A.

IPS policy is not submitted for compilation


B.

False Policy IDs are associated with IPS policy domains


C.

The IPS function is not turned on


D.

Bypass function is closed in IPS


Expert Solution
Questions # 26:

When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.

Options:

A.

True


B.

False


Expert Solution
Questions # 27:

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

Options:

A.

DHCP


B.

ARP


C.

CAPWAP


D.

802.11MAC


Expert Solution
Questions # 28:

Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)

Options:

A.

Virtual patch


B.

Mail detection


C.

SSL traffic detection


D.

Application identification and control


Expert Solution
Questions # 29:

If the regular expression is "abc. de", which of the following will not match the regular expression?

Options:

A.

abcde


B.

abcdde


C.

abclde


D.

abc+de


Expert Solution
Questions # 30:

In a WLAN network, intra-group isolation and inter-group isolation can be used at the same time.

Options:

A.

True


B.

False


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions