Summer Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

HCIP-Security-CSSN V3.0 Question and Answers

HCIP-Security-CSSN V3.0

Last Update May 21, 2024
Total Questions : 196

We are offering FREE H12-722_V3.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-722_V3.0 free exam questions and then go for complete pool of HCIP-Security-CSSN V3.0 test questions that will help you more.

H12-722_V3.0 pdf

H12-722_V3.0 PDF

$35  $99.99
H12-722_V3.0 Engine

H12-722_V3.0 Testing Engine

$42  $119.99
H12-722_V3.0 PDF + Engine

H12-722_V3.0 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)

A ICMP protocol

B. UDP protocol

C. CIP protocol

D. FTP protocol

Options:

Discussion 0
Questions 2

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

Options:

A.  

Planting malware

B.  

Vulnerability attack"

C.  

We6 Application Click

D.  

Brute force

Discussion 0
Questions 3

Which of the following options belong to the keyword matching mode? (multiple choice)

Options:

A.  

Text

B.  

Regular expressions

C.  

Community word

D.  

Custom keywords

Discussion 0
Questions 4

Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.

Options:

A.  

True

B.  

False

Discussion 0
Questions 5

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

Options:

A.  

The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source

B.  

For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify

The legitimacy of the source IP.

C.  

In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process

It will consume the TCP connection resources of the OINS cache server.

D.  

Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Discussion 0
Questions 6

Which of the following statement on the scanner is wrong?

Options:

A.  

When deploying NAC Agent, can use scanner to scan and assess the number of installed and non-installed agent.

B.  

When the terminal NAC Agent uninstall, the scanner can send alarm information.

C.  

the scanner by the SNMP protocol to obtain network equipment resources information.

D.  

scanner and Policy Center controller linkage scan tasks.

Discussion 0
Questions 7

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

Options:

A.  

Data analysis, data classification, post-processing

B.  

Data processing, data classification, post-processing

C.  

Data processing, attack classification, post-processing

D.  

Data processing, data classification, attack playback

Discussion 0
Questions 8

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

Options:

A.  

htttp://www.abcd. com:8080/news/education. aspx

B.  

htttp://www.abcd. com:8080,te

C.  

/news/education. aspx

D.  

/news/education. aspx?name=tom&age=20

Discussion 0
Questions 9

Which of the following options is not a feature of big data technology?

Options:

A.  

The data boy is huge

B.  

A wide variety of data

C.  

Low value density

D.  

Slow processing speed

Discussion 0
Questions 10

SACG query right-manager information as follows, which options are correct? (Select 2 answers)

Options:

A.  

SACG and IP address 2.1.1.1 server linkage is not successful

B.  

SACG linkage success with controller.

C.  

master controller IP address is 1.1.1.2.

D.  

master controller IP address is 2.1.1.1.

Discussion 0
Questions 11

Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?

Options:

A.  

Ordinary attacks will usually be cleaned locally first.

B.  

If there is a large traffic attack on the network, send it to the cloud cleaning center to share the cleaning pressure.

C.  

Since the Cloud Cleaning Alliance will direct larger attack flows to the cloud for cleaning, it will cause network congestion.

D.  

The closer to the attacked self-labeled cloud cleaning service, the priority will be called.

155955cc-666171a2-20fac832-0c042c0430

Discussion 0
Questions 12

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

Options:

A.  

Enhanced mode refers to the authentication method using verification code.

B.  

Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense

Effective, enhanced mode can effectively defend.

C.  

The enhanced mode is superior to the basic mode in terms of user experience.

D.  

Enhanced mode supports all HTTP Flood source authentication fields. "

WWQQ: 922333

Discussion 0
Questions 13

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

Options:

A.  

Dual machine hot backup

B.  

Power supply. 1+1 redundant backup

C.  

Hardware Bypass

D.  

Link-group

Discussion 0
Questions 14

Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?

Options:

A.  

Virus

B.  

Buffer overflow ρ

C.  

System vulnerabilities

D.  

Port scan

Discussion 0
Questions 15

Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

Options:

A.  

It cannot effectively prevent the virus from spreading from the Internet to the intranet.

B.  

The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services

Experience.

C.  

Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.

D.  

Ability to quickly adapt to threat changes

Discussion 0
Questions 16

Use BGP protocol to achieve diversion, the configuration command is as follows

[sysname] route-policy 1 permit node 1

[sysname-route-policy] apply community no-advertise

[sysname-route-policy] quit

[sysname]bgp100

155955cc-666171a2-20fac832-0c042c04

29

[sysname-bgp] peer

[sysname-bgp] import-route unr

[sysname- bgpl ipv4-family unicast

[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export

[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community

[sysname-bgp-af-ipv4] quit

[sysname-bgp]quit

Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)

Options:

A.  

Use BGP to publish UNR routes to achieve dynamic diversion.

B.  

After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.

C.  

You also need to configure the firewall ddos ​​bgp-next-hop fib-filter command to implement back-injection.

D.  

The management center does not need to configure protection objects. When an attack is discovered, it automatically issues a traffic diversion task.

Discussion 0
Questions 17

IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.

Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?

Options:

A.  

IPS is an intrusion detection system that can block real-time intrusions when found

B.  

IPS unifies IDS and firewall

C.  

IPS must use bypass deployment in the network

D.  

Common IPS deployment modes are in-line deployment,

Discussion 0
Questions 18

The administrator has made the following configuration:

1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.

2. The action of overwriting signature ID3000 is an alarm.

Options:

A.  

The action of signing iD3000 is an alarm

B.  

The action of signing ID3000 is to block

C.  

Unable to determine the action of signature ID3000

D.  

The signature set is not related to the coverage signature

Discussion 0
Questions 19

USG6000V software logic architecture is divided into three planes: management plane, control plane and

Options:

A.  

Configuration plane

B.  

Business plane

C.  

Log plane

D.  

Data forwarding plane

Discussion 0
Questions 20

Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?

Options:

A.  

display version av-sdb

B.  

display utm av version

C.  

display av utm version

D.  

display utm version

Discussion 0
Questions 21

Terminal fault diagnosis tool can diagnose fault, also can collect terminal information.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 22

Regarding the processing flow of file filtering, which of the following statements is wrong?

Options:

A.  

After the file decompression fails, the file will still be filtered. .

B.  

The application identification module can identify the type of application that carries the file.

C.  

Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.

D.  

The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data

Discussion 0
Questions 23

Which of the following options is not a cyber security threat caused by weak personal security awareness?

Options:

A.  

Disclosure of personal information

B.  

Threats to the internal network

C.  

Leaking corporate information

D.  

Increasing the cost of enterprise network operation and maintenance

Discussion 0
Questions 24

Which of the following iterations is correct for the description of the management center?

Options:

A.  

The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary

The stream is reported to the management server for report presentation.

B.  

The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.

C.  

The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.

D.  

The management center is divided into two parts: management server and teaching data collector.

Discussion 0
Questions 25

Which of the following descriptions about the black and white lists in spam filtering is wrong? c

Options:

A.  

Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.

B.  

In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address

Address one line. v

C.  

Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP

Address one line.

D.  

The priority of the blacklist is higher than that of the whitelist.

Discussion 0
Questions 26

Regarding the description of intrusion detection technology, which of the following statements is correct?

Options:

A.  

It is impossible to detect violations of security policies.

B.  

It can detect all kinds of authorized and unauthorized intrusions.

C.  

Unable to find traces of the system being attacked.

D.  

is an active and static security defense technology.

155955cc-666171a2-20fac832-0c042c0425

Discussion 0
Questions 27

Anti-DDoS defense system includes: management center, detection center and cleaning center.

Options:

A.  

True

155955cc-666171a2-20fac832-0c042c0421

B.  

False

Discussion 0
Questions 28

For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)

Options:

A.  

HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.

B.  

HTTPS Flood defense can perform source authentication by limiting the request rate of packets.

C.  

The principle of HTTPS Flood attack is to request URIs involving database operations or other URIs that consume system resources, causing server resource consumption.

Failed to respond to normal requests.

D.  

The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to the target server, causing the server resources to be exhausted and unable to respond to regular requests.

begging.

Discussion 0
Questions 29

Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

Options:

A.  

True

B.  

False

Discussion 0