HCIP-Security-CSSN V3.0
Last Update May 21, 2024
Total Questions : 196
We are offering FREE H12-722_V3.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-722_V3.0 free exam questions and then go for complete pool of HCIP-Security-CSSN V3.0 test questions that will help you more.
Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)
A ICMP protocol
B. UDP protocol
C. CIP protocol
D. FTP protocol
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
Which of the following options belong to the keyword matching mode? (multiple choice)
Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.
Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?
Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.
Which of the analysis, feedback and refinement is the function included in the first two stages?
For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?
SACG query right-manager information as follows, which options are correct? (Select 2 answers)
Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?
Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices
Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.
Which of the following options belong to the network reliability? (multiple choice)
Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?
Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)
Use BGP protocol to achieve diversion, the configuration command is as follows
[sysname] route-policy 1 permit node 1
[sysname-route-policy] apply community no-advertise
[sysname-route-policy] quit
[sysname]bgp100
155955cc-666171a2-20fac832-0c042c04
29
[sysname-bgp] peer
[sysname-bgp] import-route unr
[sysname- bgpl ipv4-family unicast
[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export
[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community
[sysname-bgp-af-ipv4] quit
[sysname-bgp]quit
Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)
IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?
The administrator has made the following configuration:
1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
2. The action of overwriting signature ID3000 is an alarm.
USG6000V software logic architecture is divided into three planes: management plane, control plane and
Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?
Terminal fault diagnosis tool can diagnose fault, also can collect terminal information.
Regarding the processing flow of file filtering, which of the following statements is wrong?
Which of the following options is not a cyber security threat caused by weak personal security awareness?
Which of the following iterations is correct for the description of the management center?
Which of the following descriptions about the black and white lists in spam filtering is wrong? c
Regarding the description of intrusion detection technology, which of the following statements is correct?
Anti-DDoS defense system includes: management center, detection center and cleaning center.
For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of the following options are correct? (multiple choice)
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.
To hide itself and the role of designated files.