Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions
Questions # 31:

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

Question # 31

Options:

A.

The firewall will first check the blacklist entries and then the whitelist entries.


B.

Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the

website.


C.

The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.


D.

The default action means that all websites are allowed to visit. So the configuration is wrong here.


Expert Solution
Questions # 32:

File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.

Options:

A.

True


B.

False


Expert Solution
Questions # 33:

Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?

1. The Netflow analysis device samples the current network flow;

2. Send a drainage command to the cleaning center;

3. Discover the DDoS attack stream;

4.Netior: analysis equipment sends alarms to ATIC management center

5. The abnormal flow is diverted to the cleaning center for further inspection and cleaning;

6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage

7. The cleaning log is sent to the management center to generate a report;

8. The cleaned traffic is sent to the original destination server.

Options:

A.

1-3-4-2-5-6-7-8


B.

1-3-2-4-6-5-7-8


C.

1-3-4-2-6-5-8-7


D.

1-3-24-6-5-8-7


Expert Solution
Questions # 34:

Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve

For confidentiality, integrity and availability. ,

Options:

A.

True


B.

False


Expert Solution
Questions # 35:

Based on the anti-virus gateway of streaming scan, which of the following descriptions is wrong?

Options:

A.

Rely on state detection technology and protocol analysis technology


B.

The performance is higher than the agent-based method


C.

The cost is smaller than the agent-based approach


D.

The detection rate is higher than the proxy-based scanning method


Expert Solution
Questions # 36:

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

Question # 36

Options:

A.

③④


B.

①③④


C.

⑤⑥


D.

②④


Expert Solution
Questions # 37:

The processing flow of IPS has the following steps;

1. Reorganize application data

2. Match the signature

3. Message processing

4. Protocol identification

Which of the following is the correct order of the processing flow?

Options:

A.

4-1-2-3


B.

1-4-2-3


C.

1-3-2-4


D.

2-4-1-3:


Expert Solution
Questions # 38:

There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Address and MC The address serves as the information to identify the user.

Options:

A.

True


B.

False


Expert Solution
Questions # 39:

Mobile smartphone, tablet PC users through Any Office Client and AE Establish IPSec Encrypted tunnel, After passing the certification and compliance check, visit the enterprise business.

Options:

A.

True


B.

False


Expert Solution
Questions # 40:

Regarding asset management, which of the following descriptions is wrong?

Options:

A.

Asset management can register assets automatically or manually.


B.

Enable the automatic asset registration mode, the asset registration process does not require end users to participate.


C.

Automatic registration of assets is suitable for situations where the asset number is automatically maintained by the business manager.


D.

Manually registering assets means that the administrator I Way to create an asset record on the business manager, and put the asset number in Any Office Enter it to complete the asset registration

process.


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 31-40 out of questions