Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions
Questions # 51:

Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.

The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?

Options:

A.

Straight forward to return authentication failure information.


B.

Discard user information.


C.

User 91 Information sent to AD The server performs verification.


D.

Synchronize the database again.


Expert Solution
Questions # 52:

In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.

Options:

A.

True


B.

False


Expert Solution
Questions # 53:

For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)

Options:

A.

HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.


B.

HTTPS Flood defense can perform source authentication by limiting the request rate of packets.


C.

The principle of HTTPS Flood attack is to request URIs involving database operations or other URIs that consume system resources, causing server resource consumption.

Failed to respond to normal requests.


D.

The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to the target server, causing the server resources to be exhausted and unable to respond to regular requests.

begging.


Expert Solution
Questions # 54:

Regarding the strategy for checking the screensaver settings, which of the following descriptions are correct? (Multiple choice)

Options:

A.

You can check whether the screen saver is enabled on the terminal


B.

You can check whether the screen saver password is enabled


C.

Only supports Windows operating system


D.

Screen saver settings cannot be automatically repaired


Expert Solution
Questions # 55:

Which of the following is the correct configuration idea for the anti-virus strategy?

1. Load the feature library

2. Configure security policy and reference AV Profile

3. Apply and activate the license

4. Configure AV Profile

5. Submit

Options:

A.

3->1->4->2->5


B.

3->2->4->1->5


C.

3->2->1->4->5


D.

3->1->2->4->5


Expert Solution
Questions # 56:

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment

Anti-Virus, IPS, spam detection and other equipment.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0414


B.

False


Expert Solution
Questions # 57:

The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)

Options:

A.

software SACG


B.

hardware SACG


C.

802.1X switch


D.

Authentication server


Expert Solution
Questions # 58:

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

Options:

A.

Address scanning


B.

Buffer overflow p


C.

Port scan


D.

IP spoofing


Expert Solution
Questions # 59:

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

Options:

A.

The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source


B.

For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify

The legitimacy of the source IP.


C.

In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process

It will consume the TCP connection resources of the OINS cache server.


D.

Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.


Expert Solution
Questions # 60:

Agile Controller-Campus The system architecture belongs to C/S Architecture.

Options:

A.

True


B.

False


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions