Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0) Question and Answers

Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)

Last Update May 16, 2024
Total Questions : 177

We are offering FREE H12-722 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-722 free exam questions and then go for complete pool of Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0) test questions that will help you more.

H12-722 pdf

H12-722 PDF

$35  $99.99
H12-722 Engine

H12-722 Testing Engine

$42  $119.99
H12-722 PDF + Engine

H12-722 PDF + Testing Engine

$56  $159.99
Questions 1

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

Options:

A.  

Enhanced mode refers to the authentication method using verification code.

B.  

Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense

Effective, enhanced mode can effectively defend.

C.  

The enhanced mode is superior to the basic mode in terms of user experience.

D.  

Enhanced mode supports all HTTP Flood source authentication fields. "

WWQQ: 922333

Discussion 0
Questions 2

The virus signature database on the device needs to be continuously upgraded from the security center platform. Which of the following is the website of the security center platform?

Options:

A.  

sec. huawei. com.

B.  

support.huaver: com

C.  

www. huawei. com

D.  

security.. huawei. com

Discussion 0
Questions 3

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

Options:

A.  

True

B.  

False

Discussion 0
Questions 4

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

Options:

A.  

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.

B.  

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.

C.  

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.

D.  

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

Discussion 0
Questions 5

In order to protect the security of data transmission, more and more websites or companies choose to use SSL to encrypt transmissions in the stream. About using Huawei NIP6000

The product performs threat detection on (SSL stream boy, which of the following statements is correct?

Options:

A.  

NIP0OO does not support SSL Threat Detection.

B.  

The traffic after threat detection is sent directly to the server without encryption

C.  

NIP can directly crack and detect SSL encryption.

D.  

After the process of "decryption", "threat detection", and "encryption"

Discussion 0
Questions 6

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

Options:

A.  

Data analysis, data classification, post-processing

B.  

Data processing, data classification, post-processing

C.  

Data processing, attack classification, post-processing

D.  

Data processing, data classification, attack playback

Discussion 0
Questions 7

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

Options:

A.  

Lack of effective protection against application layer threats.

B.  

It cannot effectively resist the spread of viruses from the Internet to the intranet.

C.  

Ability to quickly adapt to changes in threats.

D.  

Unable to accurately control various applications, such as P2P, online games, etc. .

Discussion 0
Questions 8

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

Options:

A.  

UDP fingerprint learning

B.  

Associated defense

C.  

current limit

D.  

First packet discarded

Discussion 0
Questions 9

Which of the following technologies can achieve content security? (multiple choice)

Options:

A.  

Web security protection

B.  

Global environment awareness

C.  

Sandbox and big data analysis

D.  

Intrusion prevention

Discussion 0
Questions 10

Which of the following options does not belong to the basic DDoS attack prevention configuration process?

Options:

A.  

The system starts traffic statistics.

B.  

System related configuration application, fingerprint learning.

C.  

The system starts attack prevention.

D.  

The system performs preventive actions.

Discussion 0
Questions 11

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

Options:

A.  

htttp://www.abcd. com:8080/news/education. aspx

B.  

htttp://www.abcd. com:8080,te

C.  

/news/education. aspx

D.  

/news/education. aspx?name=tom&age=20

Discussion 0
Questions 12

Which of the following signature attributes cannot be configured for IP custom signature?

Options:

A.  

ID

B.  

Message length

C.  

Agreement

D.  

Direction

Discussion 0
Questions 13

In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.

And development. Which of the following key points should be done in "things"? (multiple choice)

Options:

A.  

Vulnerability intelligence

B.  

Defense in Depth

C.  

Offensive and defensive situation

D.  

Fight back against hackers

155955cc-666171a2-20fac832-0c042c045

Discussion 0
Questions 14

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

Options:

A.  

Local upgrade

B.  

Manual upgrade

C.  

Online upgrade

D.  

Automatic upgrade

Discussion 0
Questions 15

Cloud sandbox refers to deploying the sandbox in the cloud and providing remote detection services for tenants. The process includes:

1. Report suspicious files

2. Retrospective attack

3. Firewall linkage defense

4. Prosecution in the cloud sandbox

For the ordering of the process, which of the following options is correct?

Options:

A.  

1-3-4-2

B.  

1-4-2-3

C.  

1-4-3-2

D.  

3-1-4-2:

Discussion 0
Questions 16

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

Options:

A.  

The firewall will first check the blacklist entries and then the whitelist entries.

B.  

Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the

website.

C.  

The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.

D.  

The default action means that all websites are allowed to visit. So the configuration is wrong here.

Discussion 0
Questions 17

The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

Options:

A.  

True

B.  

False

Discussion 0
Questions 18

The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.

Options:

A.  

True

B.  

False

Discussion 0
Questions 19

If the regular expression is "abc. de", which of the following will not match the regular expression?

Options:

A.  

abcde

B.  

abcdde

C.  

abclde

D.  

abc+de

Discussion 0
Questions 20

For the description of URPF technology, which of the following options are correct? (multiple choice)

Options:

A.  

The main function is to prevent network attacks based on source address spoofing.

B.  

In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.

C.  

The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.

D.  

Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.

Discussion 0
Questions 21

Which of the following options is not a feature of big data technology?

Options:

A.  

The data boy is huge

B.  

A wide variety of data

C.  

Low value density

D.  

Slow processing speed

Discussion 0
Questions 22

The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall

A True

B. False

Options:

Discussion 0
Questions 23

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

Options:

A.  

Long-term latency and collection of key data.

B.  

Leak the acquired key data information to a third party of interest

155955cc-666171a2-20fac832-0c042c044

C.  

Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.

D.  

The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.

Discussion 0
Questions 24

Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?

Options:

A.  

POP3

B.  

IMAP

C.  

FTP

D.  

TFTP

Discussion 0
Questions 25

USG6000V software logic architecture is divided into three planes: management plane, control plane and

Options:

A.  

Configuration plane

B.  

Business plane

C.  

Log plane

D.  

Data forwarding plane

Discussion 0
Questions 26

Which of the following types of attacks are DDoS attacks? 2I

Options:

A.  

Single packet attack

B.  

Floating child attack

C.  

Malformed message attack

D.  

Snooping scan attack

Discussion 0