Tag Archives: H12-722-ENU Test Questions

11 May

[May 2018] New H12-722-ENU HCNP-Security-CTSS Free Online Test

Good News: New H12-722-ENU HCNP-Security-CTSS exam questions have been updated on May.11, 2018. With latest H12-722-ENU exam questions and answers, you can completed your H12-722-ENU HCNP-Security-CTSS (Huawei Certified Network Professional -Constructing Terminal Security System) exam.

HCDATEST has released New H12-722-ENU HCNP-Security-CTSS Free Online Test to help you test H12-722-ENU exam online. There are 25 free online test questions for testing New H12-722-ENU HCNP-Security-CTSS exam. Answer one free online question correctly will get 4 score. The total is 100 score. Before deciding to hold full version of New H12-722-ENU HCNP-Security-CTSS exam questions, please test HCDATEST New H12-722-ENU HCNP-Security-CTSS Free Online Test now.

Begin to Test:

1. If the user's FTP operation matches the FTP filtering policy, which actions can be performed? (Multiple choice)

Question 1 of 25

2. About firewalls and IDS, which of the following is true?

Question 2 of 25

3. Which of the following attack types is DDoS attack?

Question 3 of 25

4. Why APT attacks are difficult to defend? Part of the reason is that they use zero-day loopholes to attack. This zero-day loopholes usually takes a lot of time to research and analyze and make corresponding defense methods.

Question 4 of 25

5. The whitelist rule of the firewall antivirus module is configured as *example*. Which of the following matches is used in this configuration?

Question 5 of 25

6. UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion.
Which of the following options does not prevent UDP flood attacks?

Question 6 of 25

7. Regarding the process of file filtering, which of the following statements is wrong?

Question 7 of 25

8. Huawei WAF products mainly consist of implementing front-end, back-end central systems and databases. The database mainly stores the front-end detection rules and black and white list configuration files.

Question 8 of 25

9. Misuse detection discovers intrusion activity in system by detecting similar behaviors of user intrusions, or by detecting violations of system security rules indirectly by exploiting system flaws.
Which of the following is not misuse detection feature?

Question 9 of 25

10. Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address.

Question 10 of 25

11. During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?

Question 11 of 25

12. What are the risks to information security caused by unauthorized access? (Multiple choices)

Question 12 of 25

13. Network attacks are classified into two types: single-packet attacks and traffic-based attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks and special packet attacks.

Question 13 of 25

14. Which of the following attacks are belong to attacks against Web servers? (Multiple choices)

Question 14 of 25

15. Which of the following is correct configuration strategy for anti-virus policy?
1. Load feature library
2. Configure security policy and reference AV profile
3. Apply and activate license
4. Configure AV Profile
5. Submit

Question 15 of 25

16. In the security protection system of cloud era, reforms must be carried out in advance, in the event, and afterwards, and continuous improvement and development of closed loops must be formed.
Which of the following key points should be fulfilled in "in the matter"? (Multiple choices)

Question 16 of 25

17. Huawei NIP6000 products provide carrier-grade high-reliability mechanisms at multiple levels to ensure the stable operation of the equipment.
Which of the following options belong to the reliability of the network? (Multiple choices)

Question 17 of 25

18. Which of the following are the common causes of IPS detection failures? (Multiple choices)

Question 18 of 25

19. About the description of the file filtering technology in the USG6000, which statement is wrong?

Question 19 of 25

20. About the anti-virus gateways based on flow-scanning, which of the following statement is wrong?

Question 20 of 25

21. For the description of the DNS Request Flood attack, which of the following option is correct?

Question 21 of 25

22. Which of the following statements is wrong about anti-spam answerback codes?

Question 22 of 25

23. The configuration commands for enabling the attack defense function are as follows:
[FW] anti-ddos syn-flood source-detect
[FW] anti-ddos udp-flood dynamic-fingerprint-learn
[FW] anti-ddos udp-frag-flood dynamic-fingerprint-learn
[FW] anti-ddos http-flood defend alert-rate 2000
[FW] anti-ddos http-flood source-detect mode basic
Which of the following are the correct descriptions of the attack prevention configuration? (Multiple Choices)

Question 23 of 25

24. The application behavior control configuration file takes effect immediately after reference, without configuring the submission.

Question 24 of 25

25. Which of the following are true about the description of keywords? (Multiple Choices)

Question 25 of 25


 

 


Recent Posts


Tags

H12-211-ENU H12-211-ENU online test H12-211-ENU practice test H12-221 H12-221-ENU H12-221-ENU online test H12-222 H12-222-ENU H12-223 H12-223-ENU H12-261 H12-261-ENU H12-261-ENU online test H12-261-ENU practice test H12-261-ENU questions and answers H12-311-ENU H13-511-ENU H13-511-ENU exam dumps H13-511-ENU latest dumps H13-511-ENU questions and answers H13-511-ENU real exam questions H13-511-ENU real questions H13-511-ENU test prep H13-511-ENU training materials H13-611-ENU H13-623-ENU exam dumps H13-629-enu H19-301-ENU exam dumps H19-307-enu H19-308 H19-308-ENU H19-308-ENU exam dumps H31-211-ENU H31-211-ENU exam dumps HCDA (Carrier IP) HCNA HCNA-Cloud-BCCP HCNA-HNTD HCNA Storage HCNP HCNP-R&S-IENP HCNP-Storage Huawei Certified Internetwork Expert-Routing & Switching Huawei Certified Network Associate-Building Cloud Computing Platform Video Conference