Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-724 - HCIP-Security (Fast track) V1.0

Page: 2 / 11
Total 367 questions

The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)

A.

software SACG

B.

hardware SACG

C.

802.1X switch

D.

Authentication server

There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.

Which of the following is not a local account?

A.

Ordinary account

B.

Guest account

C.

Anonymous account

D.

Mobile certificate account

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

A.

Data analysis, data classification, post-processing

B.

Data processing, data classification, post-processing

C.

Data processing, attack classification, post-processing

D.

Data processing, data classification, attack playback

Among the following options, which attack is a malformed packet attack based on the TCR protocol?

A.

Teardrop attack

B.

Ping of Death attack

C.

IP Spoofng attack

D.

Land attack

If the self-determined meter function is enabled on the Agile Controller-Campus and the account PMAC address is bound, Within a period of time, the number of incorrect cipher input by the end user during authentication exceeds the limit. Which of the following descriptions is correct? (multiple choice)

A.

When the account number is reserved, only the sword type number cannot be authenticated on the bound terminal device, and it can be authenticated normally on other terminal devices.

B.

The account is locked on all terminal devices and cannot be recognized.

C.

If you want to lock out the account, the administrator can only delete the account from the list.

D.

After the lock time, the account will be automatically unlocked

Which of the following elements does PDCA include? (Choose 3 answers)

A.

Plan

B.

Implementation

C.

termination

D.

Monitoring

Anti-DDoS defense system includes: management center, detection center and cleaning center.

A.

True

155955cc-666171a2-20fac832-0c042c0421

B.

False

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

A.

IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.

B.

It is impossible to correctly analyze the malicious code doped in the allowed application data stream.

C.

Unable to detect malicious operations or misoperations from internal killings.

D.

Cannot do in-depth inspection

Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?

A.

Virus

B.

Buffer overflow ρ

C.

System vulnerabilities

D.

Port scan

Which of the following options belong to the keyword matching mode? (multiple choice)

A.

Text

B.

Regular expressions

C.

Community word

D.

Custom keywords