Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

Options:

A.

It cannot effectively prevent the virus from spreading from the Internet to the intranet.


B.

The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services

Experience.


C.

Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.


D.

Ability to quickly adapt to threat changes


Expert Solution
Questions # 32:

Server Fault information collection tool Server Collector, which of the following does collected information items not include?

Options:

A.

Software and Patch


B.

sharing information and system account information


C.

System Log


D.

processes, services and startup


Expert Solution
Questions # 33:

Which of the following options is not included in the mobile terminal life cycle?

Options:

A.

Obtain


B.

deploy


C.

run


D.

Uninstall


Expert Solution
Questions # 34:

Regarding the anti-spam response code, which of the following statements is wrong?

Options:

A.

The response code will vary depending on the RBL service provider.

155955cc-666171a2-20fac832-0c042c046


B.

USG treats mails that match the answer code as spam.


C.

If the response code is not returned or the response code is not configured on the USG, the mail is released.


D.

The response code is specified as 127.0.0.1 in the second system.


Expert Solution
Questions # 35:

Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).

Options:

A.

Through the entire authentication process, the terminal passes EAP The message exchanges information with the server.


B.

Terminal and 802.1X Switch EAP Message interaction,802.1X Switch and server use Radius Message exchange information


C.

802.1X Authentication does not require security policy checks.


D.

use MD5 The algorithm checks the information.


Expert Solution
Questions # 36:

What content can be filtered by the content filtering technology of Huawei USG6000 products?

Options:

A.

File content filtering


B.

Voice content filtering


C.

Apply content filtering..


D.

The source of the video content


Expert Solution
Questions # 37:

The user needs of a university are as follows:

1. The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.

2. The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.

3. At the same time, some pornographic websites in the student area are prohibited.

The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?

155955cc-666171a2-20fac832-0c042c0415

Options:

A.

You can directly turn on the AV, IRS protection functions, and URL filtering functions in the global environment to achieve the requirements


B.

To the untrust direction, only enable AV and IPS protection functions for the server zone to protect the server


C.

In the direction of untrust to the intranet, only the AV and IPS protection functions are turned on for the server area to protect the server


D.

Go to the untrust direction to open the URL filtering function for the entire campus network, and filter some classified websites


Expert Solution
Questions # 38:

The administrator has made the following configuration:

1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.

2. The action of overwriting signature ID3000 is an alarm.

Options:

A.

The action of signing iD3000 is an alarm


B.

The action of signing ID3000 is to block


C.

Unable to determine the action of signature ID3000


D.

The signature set is not related to the coverage signature


Expert Solution
Questions # 39:

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

Options:

A.

Short message


B.

E-mail


C.

Web Print


D.

Voicemail


Expert Solution
Questions # 40:

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

Question # 40

Options:

A.

The firewall will first check the blacklist entries and then the whitelist entries.


B.

Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the

website.


C.

The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.


D.

The default action means that all websites are allowed to visit. So the configuration is wrong here.


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions