Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H12-722_V3.0 Practice Exam with Questions & Answers | Set: 4

Questions 31

An enterprise has 3 server, which is the most reasonable plan when deploy Policy Center system

planning?

Options:
A.

manager + controller + FTP + witness database, controller + master database + FTP, controller + mirror database+ FTP

B.

manager + controller + FTP + master database, controller + FTP + witness database, controller + FTP

+ mirror database

C.

manager + controller + FTP + mirror database, controller + FTP + witness database, controller + FTP +

master database

D.

manager + controller + FTP, controller + FTP + witness databases, controller + FTP + master database

Huawei H12-722_V3.0 Premium Access
Questions 32

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment

Anti-Virus, IPS, spam detection and other equipment.

Options:
A.

True

155955cc-666171a2-20fac832-0c042c0414

B.

False

Questions 33

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

Options:
A.

Local upgrade

B.

Manual upgrade

C.

Online upgrade

D.

Automatic upgrade

Questions 34

Which of the following is the default port number of Portal authentication service?

Options:
A.

1812

B.

1813

C.

50200

D.

50300

Questions 35

Which of the following is the correct configuration idea for the anti-virus strategy?

1. Load the feature library

2. Configure security policy and reference AV Profile

3. Apply and activate the license

4. Configure AV Profile

5. Submit

Options:
A.

3->1->4->2->5

B.

3->2->4->1->5

C.

3->2->1->4->5

D.

3->1->2->4->5

Questions 36

Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

Options:
A.

It cannot effectively prevent the virus from spreading from the Internet to the intranet.

B.

The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services

Experience.

C.

Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.

D.

Ability to quickly adapt to threat changes

Questions 37

For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?

Options:
A.

TCP proxy means that the firewall is deployed between the client and the server. When the SYI packet sent by the client to the server passes through the firewall, the

The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.

B.

During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is

When the document flow is heavy, the performance requirements of the firewall are often high.

C.

TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233

D.

TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.

Questions 38

Which of the following options is not a feature of Trojan horses?

Options:
A.

Not self-replicating but parasitic

B.

Trojans self-replicate and spread

C.

Actively infectious

D.

The ultimate intention is to steal information and implement remote monitoring

Questions 39

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

Options:
A.

True

B.

False

Questions 40

The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files. Which of the following is not allowed Can the reason?

Options:
A.

The file filtering configuration file is not referenced in the security policy

B.

File filtering configuration file is incorrect

C.

License is not activated.

D.

The action configuration of the file extension does not match is incorrect

Exam Code: H12-722_V3.0
Certification Provider: Huawei
Exam Name: HCIP-Security-CSSN V3.0
Last Update: Jul 15, 2025
Questions: 196