Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Huawei H12-725_V4.0 - HCIP-Security V4.0 Exam

Page: 1 / 2
Total 60 questions

Which of the following statements is false about web rewriting in web proxy?

A.

The intranet server addresses can be hidden, ensuring high security.

B.

Images may be misplaced.

C.

The fonts may be incomplete.

D.

Internet Explorer controls are required.

*In the data filtering profile on the firewall, keyword group "Keyword" is invoked in the upload direction of HTTP applications, the action is block, and the keyword group is invoked in the security policy. Given this, if the regular expression "b.d" is configured in the keyword group "Keyword,” which of the following texts can be posted by internal employees on the forum?

A.

abroad

B.

beside

C.

boring

D.

bad

Which of the following statements is false about health check?

A.

Health check supports DNS detection protocols.

B.

In addition to link connectivity detection, health check can also detect the delay, jitter, and packet loss rate of links in real time.

C.

The health check function cannot be used together with PBR.

D.

Firewalls can detect network connectivity in real time based on the health check result.

Huawei iMaster NCE-Campus is a web-based centralized management and control system in the CloudCampus Solution. It supports user access management and can function as multiple types of authentication servers. Which of the following servers can iMaster NCE-Campus not be used as?

A.

Portal server

B.

AD server

C.

RADIUS server

D.

HWTACACS server

In the figure, if 802.1X authentication is used for wired users on the network, the network admission device and terminals must be connected through a Layer 2 network.

Options:

A.

TRUE

B.

FALSE

Which of the following statements is false about Eth-Trunk?(Select All that Apply)

A.

An Eth-Trunk must have at least two member links.

B.

An Eth-Trunk must have at least one active link.

C.

An Eth-Trunk interface is a logical interface.

D.

An Eth-Trunk interface can be a Layer 2 or Layer 3 interface.

In quota control policies, which of the following can be set for users?(Select All that Apply)

A.

Limiting the daily online duration

B.

Limiting the total monthly online traffic

C.

Limiting the total daily online traffic

D.

Limiting the total online duration per month

In a Huawei network security environment, which of the following is a key advantage of using HWTACACS over RADIUS for device management authentication?

Options:

A.

HWTACACS encrypts only passwords, while RADIUS encrypts the entire payload.

B.

HWTACACS provides per-command authorization, allowing different privilege levels for different users.

C.

HWTACACS operates over UDP, ensuring faster communication than RADIUS.

D.

HWTACACS does not support accounting, while RADIUS does.

The figure shows the defense mechanism of an HTTP flood attack. Which source IP detection technology is displayed in the figure?

A.

302 redirect mode

B.

Basic mode

C.

URI monitoring

D.

Enhanced mode

Which of the following items are recorded in the IPS service module logs of a Huawei NGFW?(Select All that Apply)

A.

Signature ID

B.

Source IP address of the attacker

C.

Attack duration

D.

Signature name