[May 2018 H12-722] New Huawei H12-722 Practice Exam Questions| Killtest - PowerPoint PPT Presentation

About This Presentation
Title:

[May 2018 H12-722] New Huawei H12-722 Practice Exam Questions| Killtest

Description:

Welcome to Killtest new Huawei H12-722 Practice Exam Questions. Killtest is professional to provide new Huawei H12-722 Practice Exam Questions to ensure you pass Huawei H12-722 HCNP-Security-CSSN(Huawei Certified Network Professional - Constructing Service Security Network). H12-722 exam is related to Huawei HCNP-Security certification. With Killtest New Huawei H12-722 Practice Exam Questions, you can pass H12-722 HCNP-Security-CSSN(Huawei Certified Network Professional - Constructing Service Security Network) smoothly. Killtest New Huawei H12-722 Practice Exam Questions prepare you with all the details which are necessary for the preparation of H12-722 HCNP-Security-CSSN(Huawei Certified Network Professional - Constructing Service Security Network). Just by the consultation of online Huawei H12-722 test questions along with the ultimate Huawei H12-722 Toturials you will be able to achieve greatest success in your exam. – PowerPoint PPT presentation

Number of Views:35
Slides: 18
Provided by: stephensmith2016

less

Transcript and Presenter's Notes

Title: [May 2018 H12-722] New Huawei H12-722 Practice Exam Questions| Killtest


1
2018 H12-722 Questions KillTest
https//www.killtest.com/
2
  • Question 1
  • If the user's FTP operation matches the FTP
    filtering policy, which actions can be performed?
    (Multiple choice)
  • A. Blocking
  • B. Announcement
  • C. Alerts
  • D. Execution
  • Answer AC

3
  • Question 2
  • About firewalls and IDS, which of the following
    is true?
  • A. Firewall is a bypass device for fine-grained
    detection
  • B. IDS is a straight-path device and can't
    perform depth detection
  • C. Firewall is unable to detect insider malicious
    operation or misoperation
  • D. IDS can't interact with the firewall
  • Answer C

4
  • Question 3
  • Which of the following attack types is DDoS
    attack?
  • A. Single package attack
  • B. Traffic attack
  • C. Malformed packet attack
  • D. Snooping scanning attack
  • Answer B

5
  • Question 4
  • Why APT attacks are difficult to defend? Part of
    the reason is that they use zero-day loopholes to
    attack. This zero-day loopholes usually takes a
    lot of time to research and analyze and make
    corresponding defense methods.
  • A. True
  • B. False
  • Answer A

6
  • Question 5
  • The whitelist rule of the firewall antivirus
    module is configured as example. Which of the
    following matches is used in this configuration?
  • A. Prefix matching
  • B. Suffix matching
  • C. Keyword matching
  • D. exact match
  • Answer C

7
  • Question 6
  • UDP is a connectionless protocol. A large number
    of UDP flood attacks cause the performance of
    network devices that rely on session forwarding
    to be degraded and even the session table is
    exhausted, causing network congestion.
  • Which of the following options does not prevent
    UDP flood attacks?
  • A. UDP fingerprint learning
  • B. Associated defense
  • C. Current limiting
  • D. First packet discarded
  • Answer D

8
  • Question 7
  • Regarding the process of file filtering, which of
    the following statements is wrong?
  • A. After the file extraction fails, the file will
    still be filtered.
  • B. The application identification module can
    identify the type of application hosting the
    file.
  • C. Protocol decoding is responsible for parsing
    the file data and file transfer directions in the
    data stream.
  • D. The file type identification module is
    responsible for identifying the real type of the
    file and the extension of the file based on the
    file data
  • Answer A

9
  • Question 8
  • Huawei WAF products mainly consist of
    implementing front-end, back-end central systems
    and databases. The database mainly stores the
    front-end detection rules and black and white
    list configuration files.
  • A. True
  • B. False
  • Answer A

10
  • Question 9
  • Misuse detection discovers intrusion activity in
    system by detecting similar behaviors of user
    intrusions, or by detecting violations of system
    security rules indirectly by exploiting system
    flaws.
  • Which of the following is not misuse detection
    feature?
  • A. Easy to implement
  • B. Accurate detection
  • C. Effective detection of impersonation of
    legitimate users
  • D. Easy to upgrade
  • Answer C

11
  • Question 10
  • Huawei NIP6000 products have zero-setting network
    parameters and plug-and-play functionality
    because interfaces pairs only work on Layer 2 and
    do not need to set IP address.
  • A. True
  • B. False
  • Answer A

12
  • Question 11
  • During the infiltration phase of APT attack,
    which of the following attack behaviors will the
    attacker generally have?
  • A. Long-term latency and key data collection.
  • B. Leaks key data information to interested third
    parties.
  • C. By phishing emails, attachments carrying a
    0day vulnerability cause the user's terminal to
    become a springboard for attacks.
  • D. The attacker sends CC attack or other remote
    command to the infected host, cause the attack to
    spread horizontally across the intranet.
  • Answer D

13
  • Question 12
  • What are the risks to information security caused
    by unauthorized access? (Multiple choices)
  • A. Confidentiality
  • B. Integrity
  • C. Availability
  • D. recoverability
  • Answer AB

14
  • Question 13
  • Network attacks are classified into two types
    single-packet attacks and traffic-based attacks.
    Single-packet attacks include scanning and
    snooping attacks, malformed packet attacks and
    special packet attacks.
  • A. True
  • B. False
  • Answer A

15
  • Question 14
  • Which of the following attacks are belong to
    attacks against Web servers? (Multiple choices)
  • A. Website fishing fraud
  • B. Website Trojan
  • C. SQL injection
  • D. Cross-site scripting attacks
  • Answer CD

16
  • Question 15
  • Which of the following is correct configuration
    strategy for anti-virus policy?
  • 1. Load feature library
  • 2. Configure security policy and reference AV
    profile
  • 3. Apply and activate license
  • 4. Configure AV Profile
  • 5. Submit
  • A. 3 -gt 1 -gt 4 -gt 2 -gt 5
  • B. 3 -gt 2 -gt 4 -gt 1 -gt 5
  • C. 3 -gt 2 -gt 1 -gt 4 -gt 5
  • D. 3 -gt 1 -gt 2 -gt 4 -gt 5
  • Answer A

17
  • Thank You
  • sales_at_killtest.com

Write a Comment
User Comments (0)
About PowerShow.com