Pass the Huawei HCIP-Security H12-724 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions
Questions # 81:

Regarding the description of the account blacklist, which of the following options is wrong?

Options:

A.

The automatic account lock and manual account lock functions cannot be activated at the same time.


B.

For automatically locked accounts, if the number of incorrect passwords entered by the terminal user during authentication exceeds the limited number of times within a limited time, the account will be automatically locked.


C.

For manually locked accounts, the administrator needs to manually add the account to the locked account list.


D.

Manually lock the account and delete it from the list, the lock of the account will be released.


Expert Solution
Questions # 82:

When a virus is detected in an email, which of the following is not the corresponding action for detection?

Options:

A.

Warning


B.

Block


C.

Declare


D.

Delete attachments


Expert Solution
Questions # 83:

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system

If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)

Options:

A.

Host


B.

A group of users


C.

Single user


D.

A key program and file in the system


Expert Solution
Questions # 84:

There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.

Which of the following is not a local account?

Options:

A.

Ordinary account


B.

Guest account


C.

Anonymous account


D.

Mobile certificate account


Expert Solution
Questions # 85:

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.

Note to the original link, which of the following options does not belong to the method of re-injection?

Options:

A.

Policy routing back annotation,


B.

GRE back note:


C.

MPLS LSP back injection


D.

BGP back-annotation


Expert Solution
Questions # 86:

There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.

Options:

A.

True


B.

False


Expert Solution
Questions # 87:

Which of the following options is not a scenario supported by Free Mobility?

Options:

A.

Intranet users access the data center/Internet.


B.

When traveling users access intranet resources, traveling users pass VPN Access to the intranet.


C.

Work as a team.


D.

Realize mutual communication between devices.


Expert Solution
Questions # 88:

Among the following options, which attack is a malformed packet attack based on the TCR protocol?

Options:

A.

Teardrop attack


B.

Ping of Death attack


C.

IP Spoofng attack


D.

Land attack


Expert Solution
Questions # 89:

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

Options:

A.

Local upgrade


B.

Manual upgrade


C.

Online upgrade


D.

Automatic upgrade


Expert Solution
Questions # 90:

The anti-virus feature configured on the Huawei USG6000 product does not take effect. Which of the following are the possible reasons? (multiple choice)

Options:

A.

The security policy does not reference the anti-virus configuration file.


B.

The anti-virus configuration file is configured incorrectly.


C.

The virus signature database version is older.


D.

No virus exceptions are configured.


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 81-90 out of questions