Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions
Questions # 61:

In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?

Options:

A.

The terminal host does not install the software in the whitelist, nor the software in the blacklist.


B.

The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.


C.

The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.


D.

The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.


Expert Solution
Questions # 62:

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

Options:

A.

Long-term latency and collection of key data.


B.

Leak the acquired key data information to a third party of interest

155955cc-666171a2-20fac832-0c042c044


C.

Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.


D.

The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.


Expert Solution
Questions # 63:

Security authentication is mainly achieved through security policies. The terminal host support management for the security check of monthly users is mainly realized by loose check policies. End user behavior management is mainly realized by monitoring policies. If users need to formulate policies according to their own wishes, they can use them. Custom strategy.

Options:

A.

True


B.

False


Expert Solution
Questions # 64:

Use the command on the switch to view the status of free mobility deployment, the command is as follows:

For the above command, which of the following descriptions is correct?

Options:

A.

The control server address is 10.1.10.34


B.

The authentication device address is 10.1.31.78


C.

Status is"Working"Indicates that the switch and Controller Linkage is successful


D.

current Controller The server is backup n


Expert Solution
Questions # 65:

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

Options:

A.

Enhanced mode refers to the authentication method using verification code.


B.

Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense

Effective, enhanced mode can effectively defend.


C.

The enhanced mode is superior to the basic mode in terms of user experience.


D.

Enhanced mode supports all HTTP Flood source authentication fields. "

WWQQ: 922333


Expert Solution
Questions # 66:

Which of the following options does not belong to the basic DDoS attack prevention configuration process?

Options:

A.

The system starts traffic statistics.


B.

System related configuration application, fingerprint learning.


C.

The system starts attack prevention.


D.

The system performs preventive actions.


Expert Solution
Questions # 67:

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

Options:

A.

True


B.

False


Expert Solution
Questions # 68:

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

Options:

A.

True


B.

False


Expert Solution
Questions # 69:

Cloud sandbox refers to deploying the sandbox in the cloud and providing remote detection services for tenants. The process includes:

1. Report suspicious files

2. Retrospective attack

3. Firewall linkage defense

4. Prosecution in the cloud sandbox

For the ordering of the process, which of the following options is correct?

Options:

A.

1-3-4-2


B.

1-4-2-3


C.

1-4-3-2


D.

3-1-4-2:


Expert Solution
Questions # 70:

Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)

Options:

A.

The detection rate is higher than the flow scanning method


B.

System overhead will be relatively small


C.

Cache all files through the gateway's own protocol stack


D.

More advanced operations such as decompression, shelling, etc. can be performed


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 61-70 out of questions