Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-722 - Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)

Page: 4 / 6
Total 177 questions

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Which of the following options is not a special message attack?

A.

ICMP redirect message attack) 0l

B.

Oversized ICMP packet attack

C.

Tracert packet attack

D.

IP fragment message item

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

A.

htttp://www.abcd. com:8080/news/education. aspx

B.

htttp://www.abcd. com:8080,te

C.

/news/education. aspx

D.

/news/education. aspx?name=tom&age=20

Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device

Collect it in the log for continuous learning and optimization.

A.

True

155955cc-666171a2-20fac832-0c042c0433

B.

False

Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition

Contains content, the device can block or alert traffic containing specific keywords.

A.

True

B.

False

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

A.

Planting malware

B.

Vulnerability attack

C.

Web application attacks

D.

Brute force

When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)

A.

Warning

B.

Block

C.

Declare

D.

Operate by weight

Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)

A ICMP protocol

B. UDP protocol

C. CIP protocol

D. FTP protocol

​​SQl injection attacks generally have the following steps:

â‘ Elevate the right

â‘¡Get the data in the database

â‘¢Determine whether there are loopholes in the webpage

â‘£ Determine the database type

For the ordering of these steps, which of the following options is correct?

A.

③④①②

B.

③④②①

C.

④①②③

D.

④②①③

Which of the following options is correct for the description of the Anti DDoS system configuration?

A.

Configure drainage and re-injection on the testing equipment.

B.

Configure port mirroring on the cleaning device.

C.

Add protection objects on the management center.

D.

Configure drainage and re-injection on the management center.