Download HCIP-Security (Fast track) V1.0.H12-724.VCEplus.2022-11-14.40q.vcex

Vendor: Huawei
Exam Code: H12-724
Exam Name: HCIP-Security (Fast track) V1.0
Date: Nov 14, 2022
File Size: 704 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)
  1. Virtual patch
  2. Mail detection
  3. SSL traffic detection
  4. Application identification and control
Correct answer: ACD
Explanation:
Question 2
Regarding the processing process of file overwhelming, which of the following statements is correct?
  1. The file filtering module will compare the application type, file type, and transmission direction of the file identified by the previous module with the file filtering rules configured by the administrator.Then the lookup table performs matching from top to bottom.
  2. If all the parameters of Wenzhu can match all file filtering rules, then the module will execute the action of this file filtering rule.
  3. There are two types of actions: warning and blocking.
  4. If the file type is a compressed file, then after the file filtering check, the female file will be sent to the file decompression module for decompression and decompression.Press out the original file. If the decompression fails, the file will not be re-filed.  
Correct answer: B
Explanation:
Question 3
Which of the following options belong to the keyword matching mode? (multiple choice)
  1. Text
  2. Regular expressions
  3. Community word
  4. Custom keywords
Correct answer: AB
Explanation:
Question 4
Anti-DDoS defense system includes: management center, detection center and cleaning center.
  1. True
  2. False
Correct answer: A
Explanation:
Question 5
Regarding HTTP behavior, which of the following statements is wrong?
  1. HTTP POST is generally used to send information to the server through a web page, such as forumposting x form submission, username I password login.
  2. When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.
  3. When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management And block behavior.
  4. When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST operate.
Correct answer: D
Explanation:
Question 6
For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?
  1. Cannot control the number of received email attachments
  2. When the spam processing action is an alert, the email will be blocked and an alert will be generated
  3. You can control the size of the attachment of the received mail
  4. Cannot perform keyword filtering on incoming mail  
Correct answer: C
Explanation:
Question 7
Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.
  1. True
  2. False
Correct answer: A
Explanation:
Question 8
For the basic mode of HTTP Flood source authentication, which of the following options are correct?
(multiple choice)
  1. The basic mode can effectively block the access from the Feng Explor client.
  2. The bot tool does not implement a complete HTTP protocol stack and does not support automaticredirection, so the basic mode can effectively defend against HTTP Flood attacks.hit.
  3. When there is an HTTP proxy server in the network, the firewall will add the IP address of theproxy server to the whitelist, but it will recognize the basic source of the zombie host.The certificate is still valid.
  4. The basic mode will not affect the user experience, so the defense effect is higher than the enhanced mode.
Correct answer: AB
Explanation:
Question 9
What are the typical technologies of anti-virus engines (multiple choice)
  1. First package detection technology
  2. Heuristic detection technology
  3. Decryption technology
  4. File reputation detection technology 5
Correct answer: ABD
Explanation:
Question 10
In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc. do. Which of the following options does not belong to the action that needs to be completed in the data processing part?
  1. Data preprocessing
  2. Threat determination
  3. Distributed storage  
  4. Distributed index
Correct answer: B
Explanation:
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!