Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following options belongs to MC prioritized pail Authentication application scenarios?

Options:

A.

User use portal Page for authentication


B.

Users follow WeChat for authentication.


C.

User use IAC Client authentication


D.

User use Pota At the first certification,RAOIUS Used by the server cache terminal MAC Address, if the terminal goes offline and then goes online again within the validity period of the cache,RAIUS The server directly searches the cache for the terminal's MAC The address is discussed.


Expert Solution
Questions # 72:

Fage attack means that the original address and target address of TOP are both set to the IP address of a certain victim. This behavior will cause the victim to report to it.

SYN-ACK message is sent from the address, and this address sends back an ACK message and creates an empty connection, which causes the system resource board to occupy or target

The host crashed.

Options:

A.

True


B.

False


Expert Solution
Questions # 73:

Which of the following options is not a cyber security threat caused by weak personal security awareness?

Options:

A.

Disclosure of personal information


B.

Threats to the internal network


C.

Leaking corporate information


D.

Increasing the cost of enterprise network operation and maintenance


Expert Solution
Questions # 74:

Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.

Options:

A.

True


B.

False


Expert Solution
Questions # 75:

In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,

Consume equipment resources?

Options:

A.

Fraggle and Smurt


B.

Land and Smurf


C.

Fraggle and Land

155955cc-666171a2-20fac832-0c042c0423


D.

Teardrop and Land35


Expert Solution
Questions # 76:

Regarding the basic principles of user access security, it is wrong not to list any description?

Options:

A.

When a terminal device accesses the network, it first authenticates the user's identity through the access device, and the access device cooperates with the authentication server to complete the user Authentication.


B.

The terminal device directly interacts with the security policy server, and the terminal reports its own status information, including virus database version, operating system version, and terminal Information such as the patch version installed on the device.


C.

The security policy server checks the status information of the terminal, and for terminal devices that do not meet the corporate security standards, the security policy server reissues. The authorization information is given to the access device.


D.

The terminal device selects the answer to the resource to be accessed according to the result of the status check.


Expert Solution
Questions # 77:

For full encryption registered mobile storage devices must be formatted to normal use in not installed NAC client terminal host.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 78:

Which of the following options is right PKI The sequence description of the work process is correct?

1. PKI Entity direction CA ask CA Certificate. .

2. PKI Entity received CA After the certificate, install CA Certificate.

3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.

4. PKI Entity direction CA Send a certificate registration request message.

5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.

6. PKI Entity received CA The certificate information sent.

7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.

8. CA receive PKI The entity's certificate registration request message.

Options:

A.

1-3-5-4-2-6-7-8


B.

1-3-5-6-7-4-8-2


C.

1-3-2-7-6-4-5-8


D.

1-3-2-4-8-6-5-7


Expert Solution
Questions # 79:

After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)

Options:

A.

Only packets in one direction pass through the firewall


B.

The same message passes through the firewall multiple times


C.

IPS underreporting


D.

Excessive traffic causes the Bypass function to be enabled


Expert Solution
Questions # 80:

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

Options:

A.

Common_ user Users can access Internet www H.


B.

VIP Users can access Internet w H.


C.

VIP Can visit Mail Server H.


D.

Common user Users can access Mail_ Sever resource.


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions