Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

For the description of URPF technology, which of the following options are correct? (multiple choice)

Options:

A.

The main function is to prevent network attacks based on source address spoofing.


B.

In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.


C.

The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.


D.

Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.


Expert Solution
Questions # 72:

Which of the following options is not a special message attack?

Options:

A.

ICMP redirect message attack) 0l


B.

Oversized ICMP packet attack


C.

Tracert packet attack


D.

IP fragment message item


Expert Solution
Questions # 73:

Terminal security access technology does not include which of the following options?

Options:

A.

Access control


B.

safety certificate


C.

Authentication


D.

System Management


Expert Solution
Questions # 74:

User access authentication technology does not include which of the following options?

Options:

A.

Authentication


B.

Isolation repair'


C.

Security check


D.

Access control


Expert Solution
Questions # 75:

Which of the following options is not a feature of big data technology?

Options:

A.

The data boy is huge


B.

A wide variety of data


C.

Low value density


D.

Slow processing speed


Expert Solution
Questions # 76:

​​SQl injection attacks generally have the following steps:

①Elevate the right

②Get the data in the database

③Determine whether there are loopholes in the webpage

④ Determine the database type

For the ordering of these steps, which of the following options is correct?

Options:

A.

③④①②


B.

③④②①


C.

④①②③


D.

④②①③


Expert Solution
Questions # 77:

Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.

Options:

A.

True


B.

False


Expert Solution
Questions # 78:

Which of the following attacks are attacks against web servers? (multiple choices)

Options:

A.

Website phishing deception


B.

Website Trojan


C.

SQL injection


D.

Cross-site scripting attacks 2335


Expert Solution
Questions # 79:

What are the three main steps of business free deployment? (Multiple choice)

Options:

A.

Define security group


B.

Define and deploy group policies


C.

The system runs automatically


D.

Security group reported by the system


E.

Define user groups


Expert Solution
Questions # 80:

There are several steps in a stored XSS attack

①The attacker hijacks the user session

②The attacker submits an issue containing known JavaScript

③User login

④The user requests the attacker's question 5

⑤The server responds to the attacker’s JavaScript

⑥ The user's browser sends a session token to the attacker

⑦The attacker's JavaScript is executed in the user's browser

For the ordering of these steps, which of the following options is correct?

Options:

A.

③②⑦⑥④⑤①


B.

③②④⑤⑦⑥①


C.

③②④⑥⑤⑦①

155955cc-666171a2-20fac832-0c042c0428


D.

⑧②⑤⑦④⑥①


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions