Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-722 Questions and Answers

Question # 6

Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?

A.

POP3

B.

IMAP

C.

FTP

D.

TFTP

Full Access
Question # 7

Which of the following attacks are attacks against web servers? (multiple choices)

A.

Website phishing deception

B.

Website Trojan

C.

SQL injection

D.

Cross-site scripting attacks 2335

Full Access
Question # 8

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

A.

Lack of effective protection against application layer threats.

B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.

C.

Ability to quickly adapt to changes in threats.

D.

Unable to accurately control various applications, such as P2P, online games, etc. .

Full Access
Question # 9

Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.

A.

True

B.

False

Full Access
Question # 10

Which of the following options is not a defense against HTTP Flood attacks?

A.

HTTP Flood source authentication

B.

HTTP source statistics

C.

URI source fingerprint learning function

D.

Baseline learning

Full Access
Question # 11

Regarding scanning and snooping attacks, which of the following descriptions is wrong?

A.

Scanning attacks include address scanning and port scanning.

B.

It is usually the network detection behavior before the attacker launches the real attack.

155955cc-666171a2-20fac832-0c042c0424

C.

The source address of the scanning attack is real, so it can be defended by adding direct assistance to the blacklist.

D.

When a worm virus breaks out, it is usually accompanied by an address scanning attack, so scanning attacks are offensive.

Full Access
Question # 12

Which of the following types of attacks are DDoS attacks? 2I

A.

Single packet attack

B.

Floating child attack

C.

Malformed message attack

D.

Snooping scan attack

Full Access
Question # 13

Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.

A.

True

B.

False

Full Access
Question # 14

Which of the following is the correct configuration idea for the anti-virus strategy?

1. Load the feature library

2. Configure security policy and reference AV Profile

3. Apply and activate the license

4. Configure AV Profile

5. Submit

A.

3->1->4->2->5

B.

3->2->4->1->5

C.

3->2->1->4->5

D.

3->1->2->4->5

Full Access
Question # 15

Which of the following options will not pose a security threat to the network?

A.

Hacking

B.

Weak personal safety awareness

C.

Open company confidential files

D.

Failure to update the virus database in time

Full Access
Question # 16

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

A.

IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.

B.

It is impossible to correctly analyze the malicious code doped in the allowed application data stream.

C.

Unable to detect malicious operations or misoperations from internal killings.

D.

Cannot do in-depth inspection

Full Access
Question # 17

For the description of URPF technology, which of the following options are correct? (multiple choice)

A.

The main function is to prevent network attacks based on source address spoofing.

B.

In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.

C.

The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.

D.

Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.

Full Access
Question # 18

The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping website during working hours. So a URL filtering configuration file is configured to divide the predefined

The shopping website in the category is selected as blocked. But employee A can still use the company's network to shop online during lunch break. Then what are the following possible reasons

some?

A.

The administrator has not set the time to vote every day from 9:00 to 18:00

B.

The shopping website does not belong to the predefined shopping website category

C.

The administrator did not submit the configuration after completing the configuration.

D.

The administrator has not applied the URL pass-through configuration file to the security policy.

Full Access
Question # 19

Which of the following signature attributes cannot be configured for IP custom signature?

A.

ID

B.

Message length

C.

Agreement

D.

Direction

Full Access
Question # 20

Which of the following descriptions about viruses and Trojans are correct? (multiple choices)

A.

Viruses are triggered by computer users

B.

Viruses can replicate themselves

C.

Trojan horses are triggered by computer users

D.

Trojans can replicate themselves

Full Access
Question # 21

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

A.

Address scanning

B.

Buffer overflow p

C.

Port scan

D.

IP spoofing

Full Access
Question # 22

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Full Access
Question # 23

Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?

A.

It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects

B.

Use the newly received network packet as the data source;

C.

Real-time monitoring through the network adapter, and analysis of all communication services through the network;

D.

Used to monitor network traffic, and can be deployed independently.

Full Access
Question # 24

File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.

A.

True

B.

False

Full Access
Question # 25

The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?

A.

Prefix matching

B.

Suffix matching

155955cc-666171a2-20fac832-0c042c043

C.

Keyword matching

D.

Exact match

Full Access
Question # 26

The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.

A.

True

B.

False

Full Access