Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-725_V4.0 - HCIP-Security V4.0 Exam

Page: 2 / 2
Total 60 questions

Which of the following statements is false about HTTP behavior?

A.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the block threshold, the system blocks the uploaded or downloaded file or POST operation.

B.

When the size of the uploaded or downloaded file or the size of the content obtained through the POST operation reaches the alarm threshold, the system generates a log to notify the device administrator and block the behavior.

C.

You can set an alarm threshold and a block threshold to limit the size of the upload file if file upload is allowed.

D.

The POST method of HTTP is commonly used to send information to the server through web pages. For example, use this method when you post threads, submit forms, and use your username and password to log in to a specific system.

On a WLAN where the WAC has Portal authentication configured, VLAN authorization can be implemented with no additional configuration required. After Portal authentication is complete, the WAC forwards STA traffic based on the authorized VLANs.

A.

TRUE

B.

FALSE

IPsec VPN does not support encapsulation of non-IP unicast packets.

A.

TRUE

B.

FALSE

Which of the following statements is false about the ATIC system architecture?

A.

SecoManager functions as the management center and uses the Browser/Server architecture.

B.

The ATIC consists of the management server, collector, and controller.

C.

One management center can centrally manage multiple geographically dispersed detecting and cleaning devices.

D.

The ATIC management server manages detecting and cleaning devices.

Which of the following is not a response action for abnormal file identification?

A.

Alert

B.

Block

C.

Allow

D.

Delete

If data filtering is configured on the firewall but is not correctly referenced in the security policy, the data that should be blocked can still be transmitted normally.

A.

TRUE

B.

FALSE

When a user accesses the virtual gateway, the user can access the SSL VPN only after the user terminal passes the host check policy.

A.

TRUE

B.

FALSE

: 51 DRAG DROP

Match the description about virtual systems and VPN instances.