Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! H12-722_V3.0 HCIP-Security-CSSN V3.0 is now Stable and With Pass Result

H12-722_V3.0 Practice Exam Questions and Answers

HCIP-Security-CSSN V3.0

Last Update 1 day ago
Total Questions : 196

H12-722_V3.0 is stable now with all latest exam questions are added 1 day ago. Just download our Full package and start your journey with Huawei HCIP-Security-CSSN V3.0 certification. All these Huawei H12-722_V3.0 practice exam questions are real and verified by our Experts in the related industry fields.

H12-722_V3.0 PDF

H12-722_V3.0 PDF (Printable)
$48
$119.99

H12-722_V3.0 Testing Engine

H12-722_V3.0 PDF (Printable)
$56
$139.99

H12-722_V3.0 PDF + Testing Engine

H12-722_V3.0 PDF (Printable)
$70.8
$176.99
Question # 1

Which of the following are the control items of HTTP behavior?) (multiple choice)

Options:

A.  

POST operation

B.  

Browse the web

C.  

Acting online

D.  

File upload and download

Discussion 0
Question # 2

The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.

Options:

A.  

True

B.  

False

Discussion 0
Question # 3

What equipment do Policy Center supported servers include? (Choose 3 answers)

Options:

A.  

remote control device

B.  

mail server

C.  

Internet behavior management equipment

D.  

log collection server

Discussion 0
Question # 4

If the regular expression is "abc. de", which of the following will not match the regular expression?

Options:

A.  

abcde

B.  

abcdde

C.  

abclde

D.  

abc+de

Discussion 0
Question # 5

Which of the following signature attributes cannot be configured for IP custom signature?

Options:

A.  

ID

B.  

Message length

C.  

Agreement

D.  

Direction

Discussion 0
Question # 6

Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)

Options:

A.  

Direction is not enabled

B.  

The direction is turned on, but no specific direction is selected

C.  

The severity level of the configuration is too high

D.  

The protocol selection technique is correct

Discussion 0
Question # 7

Regarding intrusion prevention, which of the following option descriptions is wrong

Options:

A.  

Intrusion prevention is a new security defense technology that can detect and prevent intrusions.

B.  

Intrusion prevention is a security mechanism that detects intrusions (including buffer overflow attacks, Trojan horses, worms, etc.) by analyzing network traffic

C.  

Intrusion prevention can block attacks in real time.

D.  

Intrusion prevention technology, after discovering an intrusion, the firewall must be linked to prevent the intrusion

Discussion 0
Question # 8

Which of the following are typical intrusions? "Multiple choice)

Options:

A.  

Computer is infected by U disk virus

B.  

Abnormal power interruption in the computer room

C.  

Tampering with Web pages

D.  

Copy/view sensitive data

Discussion 0
Question # 9

Which of the following options is not a feature of Trojan horses?

Options:

A.  

Not self-replicating but parasitic

B.  

Trojans self-replicate and spread

C.  

Actively infectious

D.  

The ultimate intention is to steal information and implement remote monitoring

Discussion 0
Question # 10

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

Options:

A.  

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.

B.  

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.

C.  

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.

D.  

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

Discussion 0
Question # 11

Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition

Contains content, the device can block or alert traffic containing specific keywords.

Options:

A.  

True

B.  

False

Discussion 0
Question # 12

If you combine security defense with big data technology, which of the following statements are correct? (multiple choice)

Options:

A.  

In the learning process, you should start from collecting samples, analyze their characteristics and then perform machine learning.

B.  

Machine learning only counts a large number of samples, which is convenient for security administrators to view.

C.  

In the detection process, the characteristics of unknown samples need to be extracted and calculated to provide samples for subsequent static comparisons.

D.  

Security source data can come from many places, including data streams, messages, threat events, logs, etc.

Discussion 0
Question # 13

Which of the following statement is correct about Policy Center system client function?

Options:

A.  

NAC Agent support MAC account login.

B.  

Web page login for authentication and can perform checks Strategy.

C.  

Web Agent login for identity certification and security certification.

D.  

NAC Agent cannot be installed on Windows Vista operating system.

Discussion 0
Question # 14

When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.

Options:

A.  

True

B.  

False

Discussion 0
Question # 15

When configuring the terminal visits, we put some equipment configured exception equipment ,which of the following statements are true about the exception equipment?

Options:

A.  

the exception equipment IP is not in controlled network segment.

B.  

terminal in isolation domain can not access exception equipment .

C.  

only through security authentication terminals can access exception equipment.

D.  

through identity authentication terminals can access exception equipment.

Discussion 0
Question # 16

Which of the following types of attacks are DDoS attacks? 2I

Options:

A.  

Single packet attack

B.  

Floating child attack

C.  

Malformed message attack

D.  

Snooping scan attack

Discussion 0
Question # 17

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

Options:

A.  

The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.

B.  

It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa

C.  

Port mirroring needs to be configured on the management center to monitor abnormal traffic.

155955cc-666171a2-20fac832-0c042c0411

D.  

The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:

Discussion 0
Question # 18

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed

In the high-performance engine. Which of the following is not the content security detection function supported by this product?

Options:

A.  

Application recognition and perception

B.  

URL classification and filtering

C.  

Video content filtering

D.  

Intrusion prevention

155955cc-666171a2-20fac832-0c042c048

Discussion 0
Question # 19

With the continuous development of the network and the rapid development of applications, companies are making users more and more frequently start to transfer files on the network.

Virus threats are becoming more and more serious. Only by rejecting the virus outside the network can data security and system stability be guaranteed. So, which of the following are

What harm might be caused by illness? (multiple choices)

Options:

A.  

Threaten the security of the user's host and network.

B.  

Some viruses can be used as intrusion tools, such as Trojan horse viruses,

C.  

Control the host computer's accumulated limit and the user's data, and some viruses may even cause damage to the host's hardware.

D.  

Can easily pass the defense of Huawei USG6000 products

Discussion 0
Question # 20

Which of the following descriptions about the black and white lists in spam filtering is wrong? c

Options:

A.  

Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.

B.  

In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address

Address one line. v

C.  

Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP

Address one line.

D.  

The priority of the blacklist is higher than that of the whitelist.

Discussion 0
Question # 21

Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?

Options:

A.  

Resource pool mechanism

B.  

weighting mechanism

C.  

load balancing

D.  

Hot Standby

Discussion 0
Question # 22

If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?

Options:

A.  

Generate logs and discard

B.  

Generate logs and forward them

C.  

Delete the content of the email attachment

D.  

Add announcement and generate log

Discussion 0
Question # 23

Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)

A ICMP protocol

B.  

UDP protocol

C.  

CIP protocol

D.  

FTP protocol

Options:

Discussion 0
Question # 24

Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules

To detect intrusions in the system. Which of the following is not a feature of misuse detection 2

Options:

A.  

Easy to implement

B.  

Accurate detection

C.  

Effective detection of impersonation detection of legitimate users

D.  

Easy to upgrade

Discussion 0
Question # 25

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.

Options:

A.  

True

B.  

False

Discussion 0
Question # 26

The results of the RBL black and white list query on the firewall are as follows:

Question # 26

Based on the above information only, which of the following statements is correct? (multiple choice)

Options:

A.  

Mail with source address 10.17.1.0/24 will be blocked

B.  

Mail with source address 10.18.1.0/24 will be blocked

C.  

Mail with source address 10.17.1.0/24 will be released

D.  

Mail with source address 10.18.1.0/24 will be released

Discussion 0
Question # 27

The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

Options:

A.  

True

B.  

False

Discussion 0
Question # 28

Which of the following statement on the scanner is wrong?

Options:

A.  

When deploying NAC Agent, can use scanner to scan and assess the number of installed and non-installed agent.

B.  

When the terminal NAC Agent uninstall, the scanner can send alarm information.

C.  

the scanner by the SNMP protocol to obtain network equipment resources information.

D.  

scanner and Policy Center controller linkage scan tasks.

Discussion 0
Question # 29

Which of the following options will not pose a security threat to the network?

Options:

A.  

Hacking

B.  

Weak personal safety awareness

C.  

Open company confidential files

D.  

Failure to update the virus database in time

Discussion 0
Get H12-722_V3.0 dumps and pass your exam in 24 hours!

Free Exams Sample Questions