Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Huawei H12-722 Practice Exam with Questions & Answers | Set: 2

Questions 11

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

H12-722 Question 11

Options:
A.

③④

B.

①③④

C.

⑤⑥

D.

②④

Huawei H12-722 Premium Access
Questions 12

Regarding the sequence of file filtering technology processing flow, which of the following is correct?

(1) The security policy is applied as permit

(2) Protocol decoding

(3) File type recognition

(4) Application recognition

(5) File filtering

Options:
A.

(1)(2)(3)(4)(5)

155955cc-666171a2-20fac832-0c042c049

B.

(1)(4)(2)(3)(5)

C.

(1)(2)(4)(3)(5)

D.

(1)(3)(2)(4)(5)

Questions 13

Which of the following descriptions about the black and white lists in spam filtering is wrong? c

Options:
A.

Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.

B.

In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address

Address one line. v

C.

Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP

Address one line.

D.

The priority of the blacklist is higher than that of the whitelist.

Questions 14

Regarding firewall and IDS, which of the following statements is correct?

Options:
A.

The firewall is a bypass device, used for fine-grained detection

B.

IDS is a straight line equipment and cannot be used for in-depth inspection

C.

The firewall cannot detect malicious operations or misoperations by insiders

D.

IDS cannot be linked with firewall

Questions 15

The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined

The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are

Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?

Options:
A.

The weight value is 8, you can visit the web page

B.

The weight value is 10, and the page cannot be accessed

C.

The weight value is 8, the page cannot be accessed

D.

The weight value is 10, you can ask the web page before

Questions 16

When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.

Options:
A.

True

B.

False

Questions 17

Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device

Collect it in the log for continuous learning and optimization.

Options:
A.

True

155955cc-666171a2-20fac832-0c042c0433

B.

False

Questions 18

Which of the following options is not a feature of big data technology?

Options:
A.

The data boy is huge

B.

A wide variety of data

C.

Low value density

D.

Slow processing speed

Questions 19

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.

Options:
A.

True

B.

False

Questions 20

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

Options:
A.

IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.

B.

It is impossible to correctly analyze the malicious code doped in the allowed application data stream.

C.

Unable to detect malicious operations or misoperations from internal killings.

D.

Cannot do in-depth inspection

Exam Code: H12-722
Certification Provider: Huawei
Exam Name: Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)
Last Update: Jul 20, 2025
Questions: 177