Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-724 HCIP-Security (Fast track) V1.0 Exam Practice Test

Page: 1 / 37
Total 367 questions

HCIP-Security (Fast track) V1.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

Which of the following files can the sandbox detect? (multiple choice)

Options:

A.

www file

B.

PE file

C.

Picture file

D.

Mail

Question 2

Anti-DDoS defense system includes: management center, detection center and cleaning center.

Options:

A.

True

155955cc-666171a2-20fac832-0c042c0421

B.

False

Question 3

What are the typical technologies of anti-virus engines (multiple choice)

Options:

A.

First package detection technology

B.

Heuristic detection technology

C.

Decryption technology

D.

File reputation detection technology 5

Question 4

Portal At the time of certification, pass Web After the browser enters the account password for authentication, it prompts"Authenticating.."The status lasts for a long time before it shows that the authentication is successful. Which of the following reasons may cause this phenomenon?

Options:

A.

Multiple Agile Controller The same terminal IP Address added Portal"Access terminal IP Address list",Some of them Agile Controller The server and the terminal cannot communicate normally.

B.

Portal The template is configured with an incorrect password.

C.

Agile Controller-Campus There are too many authorization rules on the "It takes a lot of time to find 835

D.

Insufficient curtains of the terminal equipment result in a relatively large delay.

Question 5

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

Options:

A.

Data analysis, data classification, post-processing

B.

Data processing, data classification, post-processing

C.

Data processing, attack classification, post-processing

D.

Data processing, data classification, attack playback

Question 6

Which of the following is the default port number of Portal authentication service?

Options:

A.

1812

B.

1813

C.

50200

D.

50300

Question 7

Regarding the file source set in the software management, which of the following descriptions is correct?

Options:

A.

When the file source is an internal data source, when distributing software, the business manager will only send the path of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

Question 8

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

Options:

A.

UDP fingerprint learning

B.

Associated defense

C.

current limit

D.

First packet discarded

Question 9

Which of the following options belong to the keyword matching mode? (multiple choice)

Options:

A.

Text

B.

Regular expressions

C.

Community word

D.

Custom keywords

Question 10

When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?

Options:

A.

Can access the network? Can also access network resources.

B.

Cannot access the network.

C.

Can pick up? The network needs to be repaired before you can access network resources.

D.

You can access the network, but you need to re-authenticate to access network resources.

Question 11

After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.

Options:

A.

True

B.

False

Question 12

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

Options:

A.

Short message

B.

E-mail

C.

Web Print

D.

Voicemail

Question 13

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

Options:

A.

True

B.

False

Question 14

Regarding the sequence of file filtering technology processing flow, which of the following is correct?

(1) The security policy is applied as permit

(2) Protocol decoding

(3) File type recognition

(4) Application recognition

(5) File filtering

Options:

A.

(1)(2)(3)(4)(5)

155955cc-666171a2-20fac832-0c042c049

B.

(1)(4)(2)(3)(5)

C.

(1)(2)(4)(3)(5)

D.

(1)(3)(2)(4)(5)

Question 15

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

Options:

A.

Lack of effective protection against application layer threats.

B.

It cannot effectively resist the spread of viruses from the Internet to the intranet.

C.

Ability to quickly adapt to changes in threats.

D.

Unable to accurately control various applications, such as P2P, online games, etc. .

Question 16

Which of the following threats cannot be detected by IPS?

Options:

A.

Virus

B.

Worms

C.

Spam

D.

DoS

Question 17

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

Options:

A.

Dual machine hot backup

B.

Power supply. 1+1 redundant backup

C.

Hardware Bypass

D.

Link-group

Question 18

Which of the following are typical intrusions? "Multiple choice)

Options:

A.

Computer is infected by U disk virus

B.

Abnormal power interruption in the computer room

C.

Tampering with Web pages

D.

Copy/view sensitive data

Question 19

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

Options:

A.

Common_ user Users can access Internet www H.

B.

VIP Users can access Internet w H.

C.

VIP Can visit Mail Server H.

D.

Common user Users can access Mail_ Sever resource.

Question 20

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255

Which of the following options are correct? (multiple choice)

Options:

A.

After the configuration is complete, the switch will automatically release the data flow to access the security controller,No need for manual configuration by the administrator.

B.

This configuration allows users to access network resources before authentication.

C.

After the configuration is complete, the administrator still needs to manually configure the release network segment

D.

Only after the authentication is passed, the terminal can access 10.1.31.78 Host.

Question 21

Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct? (multiple choice)

Options:

A.

802.1X Authentication can only be initiated by the client.

B.

802.1X Certification can only be done by certified equipment(like 802.1X switch)Initiate

C.

8021X The client can trigger authentication through multicast or broadcast.

D.

The authentication equipment department triggers authentication through multicast or unicast.

Question 22

SACG query right-manager information as follows, which options are correct? (Select 2 answers)

Options:

A.

SACG and IP address 2.1.1.1 server linkage is not successful

B.

SACG linkage success with controller.

C.

master controller IP address is 1.1.1.2.

D.

master controller IP address is 2.1.1.1.

Question 23

Which of the following options is Agile Controller-Campus middle SC The main function of the component?

Options:

A.

As Agile Controller-Campus The management center is responsible for formulating the overall strategy.

B.

As Agile Controller-Campus The management interface is used to configure and monitor the system.

C.

Integrated with standards RADIUS server,Porta Server, etc., responsible for linking with network access equipment to realize user-based network access control Strategy.

D.

As Agile Controller-Campus ’S security assistance server, responsible for iRadar Analysis and calculation of reported security incidents.

Question 24

Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)

Options:

A.

A serious violation will prohibit access to the post-authentication domain.

B.

The access control list of the post-authentication domain has not been delivered SACG.

C.

ALC The number of rules issued is too many, and a lot of time is required to match, causing interruption of access services.

D.

Agile Controller-Campus Wrong post-authentication domain resources are configured on the server.

Question 25

In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.

Options:

A.

True

B.

False

Question 26

When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)

Options:

A.

Warning

B.

Block

C.

Declare

D.

Operate by weight

Question 27

Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?

Options:

A.

Different places can have different security policies.

B.

The location has nothing to do with safety.

C.

There can only be one place in the company.

D.

Place and location have nothing to do.

Question 28

Identity authentication determines whether to allow access by identifying the identity of the access device or user.

Options:

A.

True

B.

False

Question 29

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

Options:

A.

DHCP

B.

ARP

C.

CAPWAP

D.

802.11MAC

Question 30

SACG Inquire right-manager The information is as follows, which options are correct? (Multiple choice)

Options:

A.

SACG and IP Address is 2.1.1.1 The server linkage is unsuccessful.

B.

SACG The linkage with the controller is successful.

C.

main controller IP address is 1.1.1.2.

D.

main controller IP address is 2.1.1.1.

Question 31

Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?

Options:

A.

POP3

B.

IMAP

C.

FTP

D.

TFTP

Question 32

In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.

Options:

A.

True

B.

False

Question 33

Which of the following options belong to a third-party server account? (Multiple choice)

Options:

A.

AD account number

B.

Mobile certificate account)

C.

Anonymous account

D.

Guest account

Question 34

In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,

Consume equipment resources?

Options:

A.

Fraggle and Smurt

B.

Land and Smurf

C.

Fraggle and Land

155955cc-666171a2-20fac832-0c042c0423

D.

Teardrop and Land35

Question 35

An account can belong to multiple roles, that is, a user may hold multiple positions.

Options:

A.

True

B.

False

Question 36

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

Options:

A.

The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.

B.

It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa

C.

Port mirroring needs to be configured on the management center to monitor abnormal traffic.

155955cc-666171a2-20fac832-0c042c0411

D.

The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:

Question 37

Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.

Options:

A.

True

B.

False

Question 38

Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.

Options:

A.

True

B.

False

Question 39

Which of the following options is not a feature of Trojan horses?

Options:

A.

Not self-replicating but parasitic

B.

Trojans self-replicate and spread

C.

Actively infectious

D.

The ultimate intention is to steal information and implement remote monitoring

Question 40

The administrator issues notices to users in the form of announcements, such as the latest software and patch installation notices. Which of the following options of the announcement is incorrect?

Options:

A.

Announcements can be issued by the security department

B.

The terminal must have a proxy client installed to receive announcements.

C.

If the system issues an announcement and the proxy client is not online, the announcement information will not be received after going online.

D.

Announcements can be issued by account.

Question 41

Which of the following options is not a feature of big data technology?

Options:

A.

The data boy is huge

B.

A wide variety of data

C.

Low value density

D.

Slow processing speed

Question 42

In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?

Options:

A.

PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.

B.

PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.

C.

PADIUS Used for Portal Server pushes to users Web page.

D.

PADIUS Used for server to SACG Security policy issued by the device

Question 43

Which way can NAC Agent upgrade package be deployed?

Options:

A.

By IP addresses

B.

By terminal type

C.

By account

D.

By user information

Question 44

Which of the following cybersecurity threats exist only in WLAN In the network?

Options:

A.

Brute force

B.

Crowd attack

C.

DoS Denial of service attack

D.

Weak IV attack

Question 45

In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.

The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.

Options:

A.

True

B.

False

Question 46

The following is a hardware SACG increase firewall configuration, which statement below is true?

Options:

A.

Primary IP: 10.1.3.6 on behalf of SM Manager IP address.

B.

Primary IP: 10.1.3.6 on behalf of Policy Center linkage firewall interface IP address, the standby IP can enter another interface IP address of the firewall.

C.

Primary IP: 10.1.3.6 on behalf of Policy Center linkage firewall interface IP address, the standby IP can enter another alternate firewall interface IP address.

D.

Main IP is the Policy Center reaches the next-hop firewall device interface address

Question 47

Place refers to the terminal environment when end-user use strategy management center access to

controlled network office, which options are correct about place? (Choose 2 answers)

Options:

A.

strategy management center only support the default place

B.

The default place only support by way of cable access network scenario

C.

can be customized places

D.

when allocation strategy template for the end user, need to select the corresponding places

Question 48

Which of the following options is for Portal The statement of the gateway access process is correct?

Options:

A.

Portal gateway initiates Radius Challenge request message, including user name and password information

B.

The ACL issued by the server to the access gateway is carried in the Portal protocol message

C.

Issue policies while performing identity authentication

D.

The Portal server needs to pass the security check result to the access gateway device

Question 49

Regarding the processing process of file overwhelming, which of the following statements is correct?

Options:

A.

The file filtering module will compare the application type, file type, and transmission direction of the file identified by the previous module with the file filtering rules configured by the administrator.

Then the lookup table performs matching from top to bottom.

B.

If all the parameters of Wenzhu can match all file filtering rules, then the module will execute the action of this file filtering rule.

C.

There are two types of actions: warning and blocking.

D.

If the file type is a compressed file, then after the file filtering check, the female file will be sent to the file decompression module for decompression and decompression.

Press out the original file. If the decompression fails, the file will not be re-filed.

Question 50

For the convenience of visitors, different authentication and master pages can be distributed for different visitors. When configuring the push page strategy, different matching conditions need to be defined, so which of the following options can be used as the limited matching conditions? (Multiple choice)

Options:

A.

Terminal P address

B.

Location information of the access device

C.

Priority of guest accounts

D.

Connected to the network SSID'

Question 51

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

Options:

A.

Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.

B.

After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.

C.

Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.

D.

After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.

Question 52

In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?

Options:

A.

Agile Controller-Campus Integrated RADIUS All functions of server and client."

B.

Agile Controller-Campus As RADIUS On the server side, the user terminal acts as RADIUS Client.

C.

Certified equipment(like 802. 1X switch)As RADIUS On the server side, the user terminal acts as RADIUS Client.

D.

Agile Controller-Campus As RADIUS Server side, authentication device(like 802.1X switch)As RADIUS Client.

Question 53

The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.

Options:

A.

True

B.

False

Question 54

Cloud sandbox refers to deploying the sandbox in the cloud and providing remote detection services for tenants. The process includes:

1. Report suspicious files

2. Retrospective attack

3. Firewall linkage defense

4. Prosecution in the cloud sandbox

For the ordering of the process, which of the following options is correct?

Options:

A.

1-3-4-2

B.

1-4-2-3

C.

1-4-3-2

D.

3-1-4-2:

Question 55

The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined

The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are

Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?

Options:

A.

The weight value is 8, you can visit the web page

B.

The weight value is 10, and the page cannot be accessed

C.

The weight value is 8, the page cannot be accessed

D.

The weight value is 10, you can ask the web page before

Page: 1 / 37
Total 367 questions