Pass the Huawei HCIP-Security H12-725_V4.0 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following statements is false about the ATIC system architecture?

Options:

A.

SecoManager functions as the management center and uses the Browser/Server architecture.


B.

The ATIC consists of the management server, collector, and controller.


C.

One management center can centrally manage multiple geographically dispersed detecting and cleaning devices.


D.

The ATIC management server manages detecting and cleaning devices.


Expert Solution
Questions # 12:

iMaster NCE-Campus has a built-in LDAP module that enables it to function as an LDAP server to interconnect with access devices through LDAP.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 13:

*In the data filtering profile on the firewall, keyword group "Keyword" is invoked in the upload direction of HTTP applications, the action is block, and the keyword group is invoked in the security policy. Given this, if the regular expression "b.d" is configured in the keyword group "Keyword,” which of the following texts can be posted by internal employees on the forum?

Options:

A.

abroad


B.

beside


C.

boring


D.

bad


Expert Solution
Questions # 14:

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

Options:

A.

Exhaust available bandwidth.


B.

Exhaust server-side resources.


C.

Control network host rights.


D.

Exhaust network device resources.


Expert Solution
Questions # 15:

Which of the following operations can be performed to harden the Windows operating system?(Select All that Apply)

Options:

A.

Periodically check account permissions.


B.

Cancel default sharing.


C.

Restrict the number of users.


D.

Change the default TTL value.


Expert Solution
Questions # 16:

Which of the following statements is false about HTTP behavior?

Options:

A.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the block threshold, the system blocks the uploaded or downloaded file or POST operation.


B.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the alarm threshold, the system generates a log to notify the device administrator and block the behavior.


C.

You can set an alarm threshold and a block threshold to limit the size of the upload file if file upload is allowed.


D.

The POST method of HTTP is commonly used to send information to the server through web pages. For example, use this method when you post threads, submit forms, and use your username and password to log in to a specific system.


Expert Solution
Questions # 17:

Network Access Control (NAC) is an end-to-end security control technology that works in combination with AAA to implement access authentication. Which of the following statements about NAC and AAA are true?(Select All that Apply)

Options:

A.

AAA is mainly used for interaction between users and access devices.


B.

NAC is mainly used for interaction between access devices and authentication servers.


C.

NAC provides three authentication modes: 802.1X authentication, MAC address authentication, and Portal authentication.


D.

An AAA server controls network access rights of users through authentication, authorization, and accounting.


Expert Solution
Questions # 18:

HWTACACS is a centralized information exchange protocol based on the client/server structure. It uses UDP for transmission and performs authentication, authorization, and accounting for users accessing the Internet through Point-to-Point Protocol (PPP) or Virtual Private Dial-up Network (VPDN) and administrative users logging in to devices.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions