Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following

What is the content of the intrusion detection knowledge base?

Options:

A.

Complete virus sample


B.

Complete Trojan Horse


C.

Specific behavior patterns


D.

Security Policy


Expert Solution
Questions # 42:

After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?

Options:

A.

Assign to user


B.

Assigned to account


C.

Assign to terminal IP Address range


D.

Assigned to places


Expert Solution
Questions # 43:

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

Options:

A.

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.


B.

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.


C.

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.


D.

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.


Expert Solution
Questions # 44:

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

Options:

A.

The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.


B.

It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa


C.

Port mirroring needs to be configured on the management center to monitor abnormal traffic.

155955cc-666171a2-20fac832-0c042c0411


D.

The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:


Expert Solution
Questions # 45:

File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.

Options:

A.

True


B.

False


Expert Solution
Questions # 46:

When a virus is detected in an email, which of the following is not the corresponding action for detection?

Options:

A.

Warning


B.

Block


C.

Declare


D.

Delete attachments


Expert Solution
Questions # 47:

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

Options:

A.

Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.


B.

After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.


C.

Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.


D.

After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.


Expert Solution
Questions # 48:

Which of the following behaviors is a false positive of the intrusion detection system?

Options:

A.

Unable to detect new types of worms


B.

The process of trying to log in to the system is recorded


C.

Use Ping to perform network detection and be alerted as an attack


D.

Web-based attacks are not detected by the system


Expert Solution
Questions # 49:

Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)

Options:

A.

The detection rate is higher than the flow scanning method


B.

System overhead will be relatively small


C.

Cache all files through the gateway's own protocol stack


D.

More advanced operations such as decompression, shelling, etc. can be performed


Expert Solution
Questions # 50:

Which of the following options is not a challenge brought by mobile office?

Options:

A.

The mobile office platform is safe and reliable and goes online quickly.


B.

Users can access the network safely and quickly.


C.

Unified terminal management and fine control.


D.

Network gateway deployment


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions