Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! H12-724 HCIP-Security (Fast track) V1.0 is now Stable and With Pass Result

H12-724 Practice Exam Questions and Answers

HCIP-Security (Fast track) V1.0

Last Update 1 day ago
Total Questions : 367

H12-724 is stable now with all latest exam questions are added 1 day ago. Just download our Full package and start your journey with Huawei HCIP-Security (Fast track) V1.0 certification. All these Huawei H12-724 practice exam questions are real and verified by our Experts in the related industry fields.

H12-724 PDF

H12-724 PDF (Printable)
$48
$119.99

H12-724 Testing Engine

H12-724 PDF (Printable)
$56
$139.99

H12-724 PDF + Testing Engine

H12-724 PDF (Printable)
$70.8
$176.99
Question # 1

In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,

Consume equipment resources?

Options:

A.  

Fraggle and Smurt

B.  

Land and Smurf

C.  

Fraggle and Land

155955cc-666171a2-20fac832-0c042c0423

D.  

Teardrop and Land35

Discussion 0
Question # 2

Server Fault information collection tool Server Collector, which of the following does collected information items not include?

Options:

A.  

Software and Patch

B.  

sharing information and system account information

C.  

System Log

D.  

processes, services and startup

Discussion 0
Question # 3

In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If you need to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?

Options:

A.  

MAC Certification

B.  

82.1 Certification

C.  

Portal Certification

D.  

MAC(prioritized

Discussion 0
Question # 4

According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)

Options:

A.  

Basic networking includes deploying one SM Server, one SC Server, one DB and a AE server.

B.  

AE In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SC server.

C.  

SC In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup SM server.

D.  

DB In addition to the deployment of basic networking components, the reliability of the network also requires the deployment of an additional backup D

B.  

.

Discussion 0
Question # 5

Which of the following types of attacks are DDoS attacks? 2I

Options:

A.  

Single packet attack

B.  

Floating child attack

C.  

Malformed message attack

D.  

Snooping scan attack

Discussion 0
Question # 6

What are the three main steps of business free deployment? (Multiple choice)

Options:

A.  

Define security group

B.  

Define and deploy group policies

C.  

The system runs automatically

D.  

Security group reported by the system

E.  

Define user groups

Discussion 0
Question # 7

An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?

Options:

A.  

Centralized deployment

B.  

Distributed deployment

C.  

Hierarchical deployment

D.  

Both centralized deployment and distributed deployment are possible

Discussion 0
Question # 8

If the regular expression is "abc. de", which of the following will not match the regular expression?

Options:

A.  

abcde

B.  

abcdde

C.  

abclde

D.  

abc+de

Discussion 0
Question # 9

File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.

Options:

A.  

True

B.  

False

Discussion 0
Question # 10

Which of the following iterations is correct for the description of the management center?

Options:

A.  

The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary

The stream is reported to the management server for report presentation.

B.  

The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.

C.  

The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.

D.  

The management center is divided into two parts: management server and teaching data collector.

Discussion 0
Question # 11

Use on the terminal Portal The authentication is connected to the network, but you cannot jump to the authentication page. The possible reason does not include which of the following options?

Options:

A.  

Agile Controller-Campus Configured on Portal The authentication parameters are inconsistent with the access control device.

B.  

Access device Portal The authentication port number of the template configuration is 50100 ,Agile Controlle-Campus The above is the default.

C.  

CS Did not start

D.  

When the page is customized, the preset template is used.

Discussion 0
Question # 12

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

Options:

A.  

DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,

155955cc-666171a2-20fac832-0c042c047

B.  

DF bit is 023, MF bit is 1 or Fragment Offset is not 0,

C.  

DF bit is 0, and Fragment Offset + Length> 65535.

D.  

The DF bit is 1, and Fragment Ofset + Length <65535.

Discussion 0
Question # 13

Which of the following options is not a feature of big data technology?

Options:

A.  

The data boy is huge

B.  

A wide variety of data

C.  

Low value density

D.  

Slow processing speed

Discussion 0
Question # 14

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

Options:

A.  

True

B.  

False

Discussion 0
Question # 15

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.

Options:

A.  

True

B.  

False

Discussion 0
Question # 16

The use of the 802.1X authentication scheme generally requires the terminal to install specific client software. For large-scale deployment of client software, the methods that can be taken. What are the cases? (multiple choices)

Options:

A.  

Enable Guest VLAN so that users can obtain the installation package in Guest VLAN

B.  

Configure Free-rule and web push functions on the switch to push the installation package to users.

C.  

Copy the installation packages to each other via U disk.

D.  

Installed by the administrator for each user.

Discussion 0
Question # 17

In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.

Options:

A.  

True

B.  

False

Discussion 0
Question # 18

SQI Server2005 may not be properly installed, which of the following may be the possible reasons?

Options:

A.  

1433 port are occupied by the other processes

B.  

equipment 21 port is occupied

C.  

without prior installation of Microsoft SQL Server 2005 Toolkit

D.  

The operating system is Microsoft Windows Server 2003

Discussion 0
Question # 19

Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.

Options:

A.  

True

B.  

False

Discussion 0
Question # 20

Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)

Options:

A.  

File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent

Prevent employees from leaking company confidential documents to the Internet.

B.  

Content filtering can prevent the disclosure of confidential information and the transmission of illegal information

C.  

The application behavior control function can finely control common HTTP behaviors and FTP behaviors.

D.  

Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.

Discussion 0
Question # 21

With the continuous development of the network and the rapid development of applications, companies are making users more and more frequently start to transfer files on the network.

Virus threats are becoming more and more serious. Only by rejecting the virus outside the network can data security and system stability be guaranteed. So, which of the following are

What harm might be caused by illness? (multiple choices)

Options:

A.  

Threaten the security of the user's host and network.

B.  

Some viruses can be used as intrusion tools, such as Trojan horse viruses,

C.  

Control the host computer's accumulated limit and the user's data, and some viruses may even cause damage to the host's hardware.

D.  

Can easily pass the defense of Huawei USG6000 products

Discussion 0
Question # 22

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.

Options:

A.  

True

B.  

False

Discussion 0
Question # 23

For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)

Options:

A.  

HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.

B.  

HTTPS Flood defense can perform source authentication by limiting the request rate of packets.

C.  

The principle of HTTPS Flood attack is to request URIs involving database operations or other URIs that consume system resources, causing server resource consumption.

Failed to respond to normal requests.

D.  

The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to the target server, causing the server resources to be exhausted and unable to respond to regular requests.

begging.

Discussion 0
Question # 24

Portal At the time of certification, pass Web After the browser enters the account password for authentication, it prompts"Authenticating.."The status lasts for a long time before it shows that the authentication is successful. Which of the following reasons may cause this phenomenon?

Options:

A.  

Multiple Agile Controller The same terminal IP Address added Portal"Access terminal IP Address list",Some of them Agile Controller The server and the terminal cannot communicate normally.

B.  

Portal The template is configured with an incorrect password.

C.  

Agile Controller-Campus There are too many authorization rules on the "It takes a lot of time to find 835

D.  

Insufficient curtains of the terminal equipment result in a relatively large delay.

Discussion 0
Question # 25

Security authentication is mainly achieved through security policies. The terminal host support management for the security check of monthly users is mainly realized by loose check policies. End user behavior management is mainly realized by monitoring policies. If users need to formulate policies according to their own wishes, they can use them. Custom strategy.

Options:

A.  

True

B.  

False

Discussion 0
Question # 26

Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve

For confidentiality, integrity and availability. ,

Options:

A.  

True

B.  

False

Discussion 0
Question # 27

Regarding the anti-spam local black and white list, which of the following statements is wrong?

Options:

A.  

The black and white list is matched by extracting the destination IP address of the SMTP connection

B.  

The black and white list is matched by the sender's dns suffix

C.  

The black and white list is matched by extracting the source IP address of the SMTP connection

155955cc-666171a2-20fac832-0c042c0419

D.  

If the source IP address of the SMTP connection matches the blacklist, the connection will be blocked

Discussion 0
Question # 28

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

Options:

A.  

Dual machine hot backup

B.  

Power supply. 1+1 redundant backup

C.  

Hardware Bypass

D.  

Link-group

Discussion 0
Question # 29

User access authentication technology does not include which of the following options?

Options:

A.  

Authentication

B.  

Isolation repair'

C.  

Security check

D.  

Access control

Discussion 0
Question # 30

If the self-determined meter function is enabled on the Agile Controller-Campus and the account PMAC address is bound, Within a period of time, the number of incorrect cipher input by the end user during authentication exceeds the limit. Which of the following descriptions is correct? (multiple choice)

Options:

A.  

When the account number is reserved, only the sword type number cannot be authenticated on the bound terminal device, and it can be authenticated normally on other terminal devices.

B.  

The account is locked on all terminal devices and cannot be recognized.

C.  

If you want to lock out the account, the administrator can only delete the account from the list.

D.  

After the lock time, the account will be automatically unlocked

Discussion 0
Question # 31

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

Options:

A.  

Address scanning

B.  

Buffer overflow p

C.  

Port scan

D.  

IP spoofing

Discussion 0
Question # 32

When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.

Options:

A.  

True

B.  

False

Discussion 0
Question # 33

After the user is successfully authenticated, Agile Controller-Campus Which of the following actions can be performed on the user(Multiple choice)

Options:

A.  

To use Any Office The connected user performs remote assistance.

B.  

Force users to go offline.

C.  

Audit users' online and offline records.

D.  

Disable the mobile certificate account/Disable and assign roles.

Discussion 0
Question # 34

​​SQl injection attacks generally have the following steps:

①Elevate the right

②Get the data in the database

③Determine whether there are loopholes in the webpage

④ Determine the database type

For the ordering of these steps, which of the following options is correct?

Options:

A.  

③④①②

B.  

③④②①

C.  

④①②③

D.  

④②①③

Discussion 0
Question # 35

Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)

Options:

A.  

Direction is not enabled

B.  

The direction is turned on, but no specific direction is selected

C.  

The severity level of the configuration is too high

D.  

The protocol selection technique is correct

Discussion 0
Question # 36

Which of the following options belongs to MC prioritized pail Authentication application scenarios?

Options:

A.  

User use portal Page for authentication

B.  

Users follow WeChat for authentication.

C.  

User use IAC Client authentication

D.  

User use Pota At the first certification,RAOIUS Used by the server cache terminal MAC Address, if the terminal goes offline and then goes online again within the validity period of the cache,RAIUS The server directly searches the cache for the terminal's MAC The address is discussed.

Discussion 0
Question # 37

Hardware in useSACG At the time of certification,SACG After the configuration is completed, you can seeSACG andAgile Agile Controller-Campus The linkage is successful, but the user authentication fails. This phenomenon may be caused by the following reasons? (Multiple choice)

Options:

A.  

User flow has not passed SAC

G.  

B.  

SACG There is no release on the user stream.

C.  

SACG There is no closed state detection on it.

D.  

Agile Controller-Campus On and SACG Wrong key configuration for linkage

Discussion 0
Question # 38

Which of the following options is not included in the mobile terminal life cycle?

Options:

A.  

Obtain

B.  

deploy

C.  

run

D.  

Uninstall

Discussion 0
Question # 39

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

Options:

A.  

Directly discard data sent by devices that do not comply with regulations

B.  

Certification of non-compliant equipment.

C.  

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.  

Send alarm information to notify the administrator to deal with it.

Discussion 0
Question # 40

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WP

A.  

Options:

A.  

True

B.  

False

Discussion 0
Question # 41

Secure email is Any ffice Solution for corporate office 0A The killer application provided, it provides powerful email business capabilities and rich email strategies. For secure mail, which of the following descriptions are correct? (Multiple choice)

Options:

A.  

Through the mail client, you can connect No or Exchange Mail system.

B.  

Support automatic mail transmission encryption, transmission encryption method supports a full range of IPSec/TLS protocol.

C.  

Online survey of attached documents is not supported.

D.  

Support MAP4/SMTP/EAS Send and receive emails with standard protocols such as, and support real-time email push.

Discussion 0
Question # 42

When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist-item: At the same time, set it in the custom URL category.

A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More

select)

Options:

A.  

Users can visit www.videobt.com website.

B.  

The user can visit the www.bt.com website, but the administrator will receive a warning message.

C.  

User cannot access all the sites ending with bt com.

D.  

When users visit www.bt. com, they will be blocked.

Discussion 0
Question # 43

Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct? (multiple choice)

Options:

A.  

802.1X Authentication can only be initiated by the client.

B.  

802.1X Certification can only be done by certified equipment(like 802.1X switch)Initiate

C.  

8021X The client can trigger authentication through multicast or broadcast.

D.  

The authentication equipment department triggers authentication through multicast or unicast.

Discussion 0
Question # 44

When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result shows success, but the user cannot Normal access, the possible reason does not include which of the following options?

Options:

A.  

The access layer switch does not start EAP Transparent transmission function.

B.  

wireless 02K In the scenario, the access control device is not equipped with a security board

C.  

AD The service controller is not added in the authentication scenario AD area.

D.  

The user account or password is incorrectly configured.

Discussion 0
Question # 45

Which of the following options is not a scenario supported by Free Mobility?

Options:

A.  

Intranet users access the data center/Internet.

B.  

When traveling users access intranet resources, traveling users pass VPN Access to the intranet.

C.  

Work as a team.

D.  

Realize mutual communication between devices.

Discussion 0
Question # 46

Regarding intrusion prevention, which of the following option descriptions is wrong

Options:

A.  

Intrusion prevention is a new security defense technology that can detect and prevent intrusions.

B.  

Intrusion prevention is a security mechanism that detects intrusions (including buffer overflow attacks, Trojan horses, worms, etc.) by analyzing network traffic

C.  

Intrusion prevention can block attacks in real time.

D.  

Intrusion prevention technology, after discovering an intrusion, the firewall must be linked to prevent the intrusion

Discussion 0
Question # 47

Which of the following is not an abnormal situation of the file type recognition result?

Options:

A.  

The file extension does not match.

B.  

Unrecognized file type

C.  

File corruption

D.  

The file is compressed

Discussion 0
Question # 48

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

Options:

A.  

Local upgrade

B.  

Manual upgrade

C.  

Online upgrade

D.  

Automatic upgrade

Discussion 0
Question # 49

Which of the following options is not a defense against HTTP Flood attacks?

Options:

A.  

HTTP Flood source authentication

B.  

HTTP source statistics

C.  

URI source fingerprint learning function

D.  

Baseline learning

Discussion 0
Question # 50

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.

Note to the original link, which of the following options does not belong to the method of re-injection?

Options:

A.  

Policy routing back annotation,

B.  

GRE back note:

C.  

MPLS LSP back injection

D.  

BGP back-annotation

Discussion 0
Question # 51

The following configuration is in A with B The authentication commands are configured on the two admission control devices. For the analysis of the following configuration commands, which ones are correct? (Multiple choice)

Options:

A.  

A What is configured on the device is MAC Bypass authentication

B.  

B What is configured on the device is MAC Bypass authentication o

C.  

A On the device 2GE1/01 Can access PC Can also access dumb terminal equipment

D.  

B On the device GE1/0/1 Can access PC It can also access dumb terminal equipment. Upper

Discussion 0
Question # 52

If you use a normal account for authentication, which of the following descriptions is wrong?

Options:

A.  

Users can use Any Office Perform authentication.

B.  

User can't use web Way to authenticate.

C.  

Users can use Web Agent Perform authentication.

D.  

Users can use their own 802. 1X The client authenticates.

Discussion 0
Question # 53

Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

Options:

A.  

It cannot effectively prevent the virus from spreading from the Internet to the intranet.

B.  

The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services

Experience.

C.  

Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.

D.  

Ability to quickly adapt to threat changes

Discussion 0
Question # 54

Which of the following options cannot be triggered MAC Certification?

Options:

A.  

ARP Message

B.  

DHCP Message P

C.  

DHCPv6 Message

D.  

ICMP Message

Discussion 0
Question # 55

A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?

Options:

A.  

Agile Controller-Campus There is no corresponding user on.

B.  

switch AAA Configuration error.

C.  

The switch is not turned on Portal Function.

D.  

Portal The push page on the server is wrong.

Discussion 0
Get H12-724 dumps and pass your exam in 24 hours!

Free Exams Sample Questions