New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-722 Exam Dumps - Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)

Go to page:
Question # 17

Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?

A.

It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects

B.

Use the newly received network packet as the data source;

C.

Real-time monitoring through the network adapter, and analysis of all communication services through the network;

D.

Used to monitor network traffic, and can be deployed independently.

Full Access
Question # 18

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

A.

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.

B.

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.

C.

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.

D.

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

Full Access
Question # 19

After the user deploys the firewall anti-virus strategy, there is no need to deploy anti-virus software

A.

True

B.

False.

Full Access
Question # 20

The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.

A.

True

B.

False

Full Access
Question # 21

Which of the following options is not a special message attack?

A.

ICMP redirect message attack) 0l

B.

Oversized ICMP packet attack

C.

Tracert packet attack

D.

IP fragment message item

Full Access
Question # 22

Which three aspects should be considered in the design of cloud platform security solutions? (multiple choice)

A.

Infrastructure security

B.

Tenant security

C.

How to do a good job in management, operation and maintenance

D.

Hardware maintenance

Full Access
Question # 23

Which of the following technologies can achieve content security? (multiple choice)

A.

Web security protection

B.

Global environment awareness

C.

Sandbox and big data analysis

D.

Intrusion prevention

Full Access
Question # 24

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom &age=20, which option is path?

A.

htttp://www.abcd. com:8080/news/education. aspx

B.

htttp://www.abcd. com:8080,te

C.

/news/education. aspx

D.

/news/education. aspx?name=tom&age=20

Full Access
Go to page: