Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Huawei H12-724 - HCIP-Security (Fast track) V1.0

Page: 7 / 11
Total 367 questions

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

A.

UDP fingerprint learning

B.

Associated defense

C.

current limit

D.

First packet discarded

Which of the following options are common behavioral characteristics of viruses? (multiple choices)

A.

Download and backdoor features

B.

Information collection characteristics

C.

Self-hidden features

D.

Network attack characteristics

Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)

A.

Virtual patch

B.

Mail detection

C.

SSL traffic detection

D.

Application identification and control

Which of the following options cannot be triggered MAC Certification?

A.

ARP Message

B.

DHCP Message P

C.

DHCPv6 Message

D.

ICMP Message

Regarding worms and viruses, which of the following statements is correct?

A.

Worms exist in a parasitic way

155955cc-666171a2-20fac832-0c042c0413

B.

Viruses mainly rely on system vulnerabilities to spread

C.

The target of the worm infection is other computer systems on the network.

D.

The virus exists independently in the computer system.

What are the three main steps of business free deployment? (Multiple choice)

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

Which of the following descriptions about the black and white lists in spam filtering is wrong? c

A.

Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.

B.

In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address

Address one line. v

C.

Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP

Address one line.

D.

The priority of the blacklist is higher than that of the whitelist.

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

A.

Short message

B.

E-mail

C.

Web Print

D.

Voicemail

For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)

A.

Authentication data flow has passed SACG filter.

B.

TSM No hardware is added to the system SACG equipment.

C.

SACG Enable the default inter-domain packet filtering.

D.

Privileges are misconfigured IP

Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?

A.

Wired access

B.

Wireless access

C.

VPN Access

D.

802.1X Access