New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

H12-724 HCIP-Security (Fast track) V1.0 Questions and Answers

Questions 4

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed

In the high-performance engine. Which of the following is not the content security detection function supported by this product?

Options:

A.

Application recognition and perception

B.

URL classification and filtering

C.

Video content filtering

D.

Intrusion prevention

155955cc-666171a2-20fac832-0c042c048

Buy Now
Questions 5

Which of the following series of devices does not support the function of accompanying business?

Options:

A.

S5720HI Series Switch:

B.

AR Series router

C.

USG6000 Series firewall

D.

SVN5600 series

Buy Now
Questions 6

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

Options:

A.

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.

B.

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.

C.

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.

D.

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

Buy Now
Questions 7

Web Standards that come with the client and operating system 8021 The instrument client only has the function of identity authentication: It does not support the execution of inspection strategies and monitoring strategies. Any Office The client supports all inspection strategies and monitoring strategies.

Options:

A.

True

B.

False

Buy Now
Questions 8

Regarding the processing flow of file filtering, which of the following statements is wrong?

Options:

A.

After the file decompression fails, the file will still be filtered. .

B.

The application identification module can identify the type of application that carries the file.

C.

Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.

D.

The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data

Buy Now
Questions 9

Install Agile Controller-Campus Which of the following steps do not need to be completed before?

Options:

A.

Install the operating system

B.

Install the database

C.

Install antivirus software

D.

Import License

Buy Now
Questions 10

If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

Options:

A.

Block

B.

Declare

C.

Alarm

D.

Execution

Buy Now
Questions 11

Which of the following elements does PDCA include? (Choose 3 answers)

Options:

A.

Plan

B.

Implementation

C.

termination

D.

Monitoring

Buy Now
Questions 12

Which of the following statement on the scanner is wrong?

Options:

A.

When deploying NAC Agent, can use scanner to scan and assess the number of installed and non-installed agent.

B.

When the terminal NAC Agent uninstall, the scanner can send alarm information.

C.

the scanner by the SNMP protocol to obtain network equipment resources information.

D.

scanner and Policy Center controller linkage scan tasks.

Buy Now
Questions 13

Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)

Options:

A.

The biggest difference between the two is MAC Bypass authentication belongs to 802 1X Certification, while MAC Certification does not belong to 802 1X Certification.

B.

If a network can connect to dumb terminals(printer,IP telephone), The text may be connected to a portable computer, please use MAC Bypass authentication:First try 802 1X Authentication, try again if authentication fails MAC Certification

C.

If a network will only connect to dumb terminals(printer,IP telephone),please use MAC Certification in order to shorten the certification time.

D.

MAC Authentication MAC One more bypass authentication 802 In the instrument certification process, the open time is longer than MAC The bypass authentication time is long.

Buy Now
Questions 14

For the terminal Wi-Fi The order of the push, which of the following is correct?

1. Any Office Mobile office system push Wi-Fi Configuration

2. Any Office The mobile office department automatically applies for a certificate.

3. The administrator configures the enterprise Wi-Fi Push.

4. The terminal automatically connects to the enterprise Wi-Fi.

Options:

A.

1-2-3-4

B.

4-2-3-1

C.

3-2-1-4

D.

2-3-1-4

Buy Now
Questions 15

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

Options:

A.

Directly discard data sent by devices that do not comply with regulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

Buy Now
Questions 16

In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?

Options:

A.

DHCP

B.

ARP

C.

CAPWAP

D.

802.11MAC

Buy Now
Questions 17

On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)

Options:

A.

all Ad-hoc The device will be directly judged as an illegal device

B.

Not this AC Access AP Is illegal AP

C.

Not this AC Access STA Is illegal STA

D.

Not this AC Access STA,Also need to check access AP Does it contain law

Buy Now
Questions 18

There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.

Options:

A.

True

B.

False

Buy Now
Questions 19

In order to increase AP The security can be AC Going online AP Perform authentication. Currently Huawei AC What are the supported authentication methods? (Multiple choice)

Options:

A.

MAC Certification

B.

Password authentication

C.

Not certified:

D.

SN Certification

Buy Now
Questions 20

The application behavior control configuration file takes effect immediately after being referenced, without configuration submission.

Options:

A.

True

B.

False

Buy Now
Questions 21

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

Options:

A.

UDP fingerprint learning

B.

Associated defense

C.

current limit

D.

First packet discarded

Buy Now
Questions 22

Which of the following options will not pose a security threat to the network?

Options:

A.

Hacking

B.

Weak personal safety awareness

C.

Open company confidential files

D.

Failure to update the virus database in time

Buy Now
Questions 23

IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.

Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?

Options:

A.

IPS is an intrusion detection system that can block real-time intrusions when found

B.

IPS unifies IDS and firewall

C.

IPS must use bypass deployment in the network

D.

Common IPS deployment modes are in-line deployment,

Buy Now
Questions 24

The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide

Analyze the suspicious object, which of the following options are its main features? (multiple choices)

Options:

A.

Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so

Not vulnerable to attack.

B.

The monitoring speed is fast (the problem can be found in microseconds or seconds, and the host-based DS needs to take an analysis of the audit transcripts in the last few minutes

C.

Need a lot of monitors.

D.

It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.

Buy Now
Questions 25

URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.

The purpose of the Internet behavior.

Options:

A.

True

B.

False

Buy Now
Questions 26

With the continuous development of the network and the rapid development of applications, companies are making users more and more frequently start to transfer files on the network.

Virus threats are becoming more and more serious. Only by rejecting the virus outside the network can data security and system stability be guaranteed. So, which of the following are

What harm might be caused by illness? (multiple choices)

Options:

A.

Threaten the security of the user's host and network.

B.

Some viruses can be used as intrusion tools, such as Trojan horse viruses,

C.

Control the host computer's accumulated limit and the user's data, and some viruses may even cause damage to the host's hardware.

D.

Can easily pass the defense of Huawei USG6000 products

Buy Now
Questions 27

An enterprise adopts hardware SACG access method for admission control. The configuration commands are as follows, among which Key; Admin@123

[USG] right-manager server-group

[USG-rightm] localip 10.1.10.2

[USG-rightm]serverip 10. 1.31.78 shared-key AdnIn@123

[USG2100-rightm] right-manager server-group enable.

Assuming that the other configurations are correct, based on the above configuration only, which of the following options is correct?

Options:

A.

After completing the configuration, SACG can successfully link with the Agile Controller-Campus.

B.

After completing the configuration, SACG cannot successfully link with Agile Contrlle-Campus. P

C.

Can issue pre-authentication domain ACL.

D.

The linkage cannot be successful but the terminal can access the pre-authentication domain server.

Buy Now
Questions 28

Visitors can access the network through their registered account. Which of the following is not an account approval method?

Options:

A.

Exemption from approval

B.

Administrator approval

C.

Receptionist approval

D.

Self-approved by visitors

Buy Now
Questions 29

Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

Options:

A.

It cannot effectively prevent the virus from spreading from the Internet to the intranet.

B.

The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services

Experience.

C.

Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.

D.

Ability to quickly adapt to threat changes

Buy Now
Questions 30

If you use a normal account for authentication, which of the following descriptions is wrong?

Options:

A.

Users can use Any Office Perform authentication.

B.

User can't use web Way to authenticate.

C.

Users can use Web Agent Perform authentication.

D.

Users can use their own 802. 1X The client authenticates.

Buy Now
Questions 31

Mobile smartphone, tablet PC users through Any Office Client and AE Establish IPSec Encrypted tunnel, After passing the certification and compliance check, visit the enterprise business.

Options:

A.

True

B.

False

Buy Now
Questions 32

Which of the following options belong to the network layer attack of the TCP/IP protocol stack? (multiple choice)

Options:

A.

Address scanning

B.

Buffer overflow p

C.

Port scan

D.

IP spoofing

Buy Now
Questions 33

Which of the following options is not a special message attack?

Options:

A.

ICMP redirect message attack) 0l

B.

Oversized ICMP packet attack

C.

Tracert packet attack

D.

IP fragment message item

Buy Now
Questions 34

Regarding the enhanced mode in HTTP Flood source authentication, which of the following descriptions are correct? Multiple choices

Options:

A.

Enhanced mode refers to the authentication method using verification code.

B.

Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense

Effective, enhanced mode can effectively defend.

C.

The enhanced mode is superior to the basic mode in terms of user experience.

D.

Enhanced mode supports all HTTP Flood source authentication fields. "

WWQQ: 922333

Buy Now
Questions 35

An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .

Which of the following is the entry that the firewall will match when looking up the website URL?

Options:

A.

example

B.

www. abc. example. com

C.

www.abc. example

D.

example. com

Buy Now
Questions 36

There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.

Options:

A.

True

B.

False

Buy Now
Questions 37

In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.

Options:

A.

True

B.

False

Buy Now
Questions 38

Which of the following descriptions about viruses and Trojans are correct? (multiple choices)

Options:

A.

Viruses are triggered by computer users

B.

Viruses can replicate themselves

C.

Trojan horses are triggered by computer users

D.

Trojans can replicate themselves

Buy Now
Questions 39

There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.

Which of the following is not a local account?

Options:

A.

Ordinary account

B.

Guest account

C.

Anonymous account

D.

Mobile certificate account

Buy Now
Questions 40

How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)

Options:

A.

Open https://SM server IP:8943 in the browser, enter the account admin and the default password Changeme123, if the login is successful, it will be explained. The SIM components are normal.

B.

After logging in to SC, select Resources>Users>User Management to create a common account. Open https://SM server IP:8447 in the browser newauth, if you can successfully log in using the account created in the previous step, the SM component is normal.

C.

Open https://SC Server IP:8443 in the browser and enter the account admin and the default password Changeme123. If the login is successful, it will be explained. The SC component is normal.

D.

After logging in to SM, select Ziyuan>User>User Management, and Xinlu has a common part number. Open https://SC server IP:8447 newauth in the browser. If you can successfully log in with the account created in the previous step, it means that the SC component is Wang Chang.

Buy Now
Questions 41

According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)

Options:

A.

WhoTo determine the ownership of the access device(Company standard,BYOD Wait)

B.

WhoseTo determine the identity of the access person(member I, Visitors, etc.)

C.

How Determine the access method(Wired, wireless, etc.)

D.

WhatTo determine the access device(PC,iOS Wait)

Buy Now
Questions 42

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

Options:

A.

htttp://www.abcd. com:8080/news/education. aspx

B.

htttp://www.abcd. com:8080,te

C.

/news/education. aspx

D.

/news/education. aspx?name=tom&age=20

Buy Now
Questions 43

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

Options:

A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Buy Now
Questions 44

Which of the following is the default port number of Portal authentication service?

Options:

A.

1812

B.

1813

C.

50200

D.

50300

Buy Now
Questions 45

Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?

Options:

A.

Resource pool mechanism

B.

weighting mechanism

C.

load balancing

D.

Hot Standby

Buy Now
Questions 46

The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.

Options:

A.

True

B.

False

Buy Now
Questions 47

In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth,

Consume equipment resources?

Options:

A.

Fraggle and Smurt

B.

Land and Smurf

C.

Fraggle and Land

155955cc-666171a2-20fac832-0c042c0423

D.

Teardrop and Land35

Buy Now
Questions 48

The following is a hardware SACG increase firewall configuration, which statement below is true?

H12-724 Question 48

Options:

A.

Primary IP: 10.1.3.6 on behalf of SM Manager IP address.

B.

Primary IP: 10.1.3.6 on behalf of Policy Center linkage firewall interface IP address, the standby IP can enter another interface IP address of the firewall.

C.

Primary IP: 10.1.3.6 on behalf of Policy Center linkage firewall interface IP address, the standby IP can enter another alternate firewall interface IP address.

D.

Main IP is the Policy Center reaches the next-hop firewall device interface address

Buy Now
Questions 49

In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.

Options:

A.

True

B.

False

Buy Now
Questions 50

In centralized networking, database,SM server,SC server\ AE Servers are centrally installed in the corporate headquarters. This networking method is suitable for companies with a wide geographical distribution of users and a large number of users.

Options:

A.

True

B.

False

Buy Now
Questions 51

The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).

Options:

A.

True

B.

False

Buy Now
Questions 52

Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)

Options:

A.

The detection rate is higher than the flow scanning method

B.

System overhead will be relatively small

C.

Cache all files through the gateway's own protocol stack

D.

More advanced operations such as decompression, shelling, etc. can be performed

Buy Now
Questions 53

MAC Bypass authentication means that after the terminal is connected to the network, the access control device automatically obtains the terminal MAC Address, which is sent to RADIUS The server performs euverification.

Options:

A.

True

B.

False

Buy Now
Questions 54

Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)

Options:

A.

Deployment Management Center MC Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

B.

Deploy Business Manager SM Time, support HA, Provide based on Keepalived Technical HA Active/standby switchover.

C.

Deploy business controller 3SC Time, support HA, Provide a backup solution in resource pool mode, which needs to be deployed N+1 indivual SC

D.

Deploy the database DB Time, support HA use SQL Server Database mirroring technology requires the deployment of master DB+Mirroring DB+witness DB.

Buy Now
Questions 55

SACG query right-manager information as follows, which options are correct? (Select 2 answers)

H12-724 Question 55

Options:

A.

SACG and IP address 2.1.1.1 server linkage is not successful

B.

SACG linkage success with controller.

C.

master controller IP address is 1.1.1.2.

D.

master controller IP address is 2.1.1.1.

Buy Now
Exam Code: H12-724
Exam Name: HCIP-Security (Fast track) V1.0
Last Update: Dec 17, 2024
Questions: 367

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now H12-724 testing engine

PDF (Q&A)

$36.75  $104.99
buy now H12-724 pdf