IT認証試験問題集
毎月、ITshikenは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / H12-722 問題集  / H12-722 問題練習

Huawei H12-722 問題練習

HCIP-Security-CSSN(Huawei Certified ICT Professional -Constructing Service Security Network) 試験

最新更新時間: 2021/01/16,合計20問。

2021新年のギフト:H12-722 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、H12-722 問題集を使用してください。

 / 2

Question No : 1
About the description of the file filtering technology in the USG6000, which statement is wrong?

正解:

Question No : 2
Which of the following are the common causes of IPS detection failures? (Multiple choices)

正解:

Question No : 3
Huawei NIP6000 products provide carrier-grade high-reliability mechanisms at multiple levels to ensure the stable operation of the equipment.
Which of the following options belong to the reliability of the network? (Multiple choices)

正解:

Question No : 4
In the security protection system of cloud era, reforms must be carried out in advance, in the event, and afterwards, and continuous improvement and development of closed loops must be formed.
Which of the following key points should be fulfilled in "in the matter"? (Multiple choices)

正解:

Question No : 5
Which of the following is correct configuration strategy for anti-virus policy?
(1) Load feature library
(2) Configure security policy and reference AV profile
(3) Apply and activate license
(4) Configure AV Profile
(5) Submit

正解:

Question No : 6
Which of the following attacks are belong to attacks against Web servers? (Multiple choices)

正解:

Question No : 7
Network attacks are classified into two types: single-packet attacks and traffic-based attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks and special packet attacks.

正解:

Question No : 8
What are the risks to information security caused by unauthorized access? (Multiple choices)

正解:

Question No : 9
During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?

正解:

Question No : 10
Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address.

正解:

Question No : 11
Misuse detection discovers intrusion activity in system by detecting similar behaviors of user intrusions, or by detecting violations of system security rules indirectly by exploiting system flaws.
Which of the following is not misuse detection feature?

正解:

Question No : 12
Huawei WAF products mainly consist of implementing front-end, back-end central systems and databases. The database mainly stores the front-end detection rules and black and white list configuration files.

正解:

Question No : 13
Regarding the process of file filtering, which of the following statements is wrong?

正解:

Question No : 14
UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion.
Which of the following options does not prevent UDP flood attacks?

正解:

Question No : 15
The whitelist rule of the firewall antivirus module is configured as *example*. Which of the following matches is used in this configuration?

正解:

 / 2