Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Master the Huawei H12-722 Exam: Essential Study Tips and Strategies

Questions 21

The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping website during working hours. So a URL filtering configuration file is configured to divide the predefined

The shopping website in the category is selected as blocked. But employee A can still use the company's network to shop online during lunch break. Then what are the following possible reasons

some?

Options:

A.

The administrator has not set the time to vote every day from 9:00 to 18:00

B.

The shopping website does not belong to the predefined shopping website category

C.

The administrator did not submit the configuration after completing the configuration.

D.

The administrator has not applied the URL pass-through configuration file to the security policy.

Buy Now
Questions 22

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

Options:

A.

The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source

B.

For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify

The legitimacy of the source IP.

C.

In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process

It will consume the TCP connection resources of the OINS cache server.

D.

Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Buy Now
Questions 23

Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following

What is the content of the intrusion detection knowledge base?

Options:

A.

Complete virus sample

B.

Complete Trojan Horse

C.

Specific behavior patterns

D.

Security Policy

Buy Now
Questions 24

The virus signature database on the device needs to be continuously upgraded from the security center platform. Which of the following is the website of the security center platform?

Options:

A.

sec. huawei. com.

B.

support.huaver: com

C.

<a href="www.">www.</a> huawei. com

D.

security.. huawei. com

Buy Now
Questions 25

The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?

Options:

A.

Prefix matching

B.

Suffix matching

155955cc-666171a2-20fac832-0c042c043

C.

Keyword matching

D.

Exact match

Buy Now
Questions 26

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

Options:

A.

True

B.

False

Buy Now
Questions 27

Which of the following is not an abnormal situation of the file type recognition result?

Options:

A.

The file extension does not match.

B.

Unrecognized file type

C.

File corruption

D.

The file is compressed

Buy Now
Questions 28

Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?

Options:

A.

File extension mismatch means that the file type is inconsistent with the file extension.

B.

Unrecognized file type means that the file type cannot be recognized and there is no file extension.

C.

File damage means that the file type cannot be identified because the file is damaged.

D.

Unrecognized file type means that the file type cannot be recognized, and the file extension cannot be recognized.

Buy Now
Questions 29

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

Options:

A.

Dual machine hot backup

B.

Power supply. 1+1 redundant backup

C.

Hardware Bypass

D.

Link-group

Buy Now
Questions 30

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

Options:

A.

Address scanning

B.

Buffer overflow p

C.

Port scan

D.

IP spoofing

Buy Now