Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following options will not pose a security threat to the network?

Options:

A.

Hacking


B.

Weak personal safety awareness


C.

Open company confidential files


D.

Failure to update the virus database in time


Expert Solution
Questions # 82:

In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?

Options:

A.

The terminal host does not install the software in the whitelist, nor the software in the blacklist.


B.

The terminal host installs all the software in the whitelist, but does not install the software in the blacklist.


C.

The terminal host installs part of the software in the whitelist, but does not install the software in the blacklist.


D.

The terminal host installs all the software in the whitelist, and also installs some of the software in the blacklist.


Expert Solution
Questions # 83:

What are the typical technologies of anti-virus engines (multiple choice)

Options:

A.

First package detection technology


B.

Heuristic detection technology


C.

Decryption technology


D.

File reputation detection technology 5


Expert Solution
Questions # 84:

Which of the following technologies can achieve content security? (multiple choice)

Options:

A.

Web security protection


B.

Global environment awareness


C.

Sandbox and big data analysis


D.

Intrusion prevention


Expert Solution
Questions # 85:

Which of the following options are relevant to Any Office The description of the solution content is correct? (Multiple choice)

Options:

A.

Provide unified and secure access to enterprise mobile applications on mobile terminals.


B.

The tunnel is dedicated and cannot be penetrated by viruses.


C.

Applications are quickly integrated and can be extended.


D.

It can be quickly integrated and docked with the enterprise application cloud platform.


Expert Solution
Questions # 86:

Regarding Huawei's anti-virus technology, which of the following statements is wrong?

Options:

A.

The virus detection system cannot directly detect compressed files


B.

The anti-virus engine can detect the file type through the file extension


C.

Gateway antivirus default file maximum decompression layer is 3 layers


D.

The implementation of gateway antivirus is based on proxy scanning and stream scanning


Expert Solution
Questions # 87:

An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?

Question # 87

Options:

A.

The content in No. 2 must be configured.


B.

In addition to this page configuration, you also need to enable the firewall and sandbox linkage, otherwise the page configuration is invalid


C.

The content in No. 4 must be configured.


D.

After the configuration is completed, you need to submit the configuration to take effect.


Expert Solution
Questions # 88:

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

Options:

A.

True


B.

False


Expert Solution
Questions # 89:

Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main

Which four major components are included?

Options:

A.

Event extraction, intrusion analysis, reverse intrusion and remote management.


B.

Incident extraction, intrusion analysis, intrusion response and on-site management.


C.

Incident recording, intrusion analysis, intrusion response and remote management.


D.

Incident extraction, intrusion analysis, intrusion response and remote management.


Expert Solution
Questions # 90:

Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)

Options:

A.

The biggest difference between the two is MAC Bypass authentication belongs to 802 1X Certification, while MAC Certification does not belong to 802 1X Certification.


B.

If a network can connect to dumb terminals(printer,IP telephone), The text may be connected to a portable computer, please use MAC Bypass authentication:First try 802 1X Authentication, try again if authentication fails MAC Certification


C.

If a network will only connect to dumb terminals(printer,IP telephone),please use MAC Certification in order to shorten the certification time.


D.

MAC Authentication MAC One more bypass authentication 802 In the instrument certification process, the open time is longer than MAC The bypass authentication time is long.


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions