Pre-Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-725_V4.0 Exam Dumps - HCIP-Security V4.0 Exam

Go to page:
Question # 9

Which of the following statements is false about the ATIC system architecture?

A.

SecoManager functions as the management center and uses the Browser/Server architecture.

B.

The ATIC consists of the management server, collector, and controller.

C.

One management center can centrally manage multiple geographically dispersed detecting and cleaning devices.

D.

The ATIC management server manages detecting and cleaning devices.

Full Access
Question # 10

Trojan horses may disclose sensitive information of victims or even remotely manipulate victims' hosts, causing serious harm. Which of the following are the transmission modes of Trojan horses?(Select All that Apply)

A.

Attackers exploit vulnerabilities to break into hosts and install Trojan horses.

B.

A Trojan horse is bundled in a well-known tool program.

C.

The software downloaded from a third-party downloader carries Trojan horses.

D.

A Trojan horse masquerades as a tool program to deceive users to run the program on a host. Once the program is run, the Trojan horse is automatically implanted into the host.

Full Access
Question # 11

Which of the following statements is false about RADIUS and HWTACACS?

A.

Both of them feature good flexibility and extensibility.

B.

Both of them use the client/server model.

C.

Both of them support authorization of configuration commands.

D.

Both of them use shared keys to encrypt user information.

Full Access
Question # 12

The Nginx application is deployed on a Linux host. By checking Nginx logs, O&M engineers can obtain the complete URL information submitted by users and determine whether the Linux host is under SQL injection attacks.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following are components of Huawei's anti-DDoS solution?(Select All that Apply)

A.

Detecting center

B.

Management center

C.

Zone

D.

Cleaning center

Full Access
Question # 14

Which of the following statements is true about the outgoing traffic in the firewall virtual system?

A.

Traffic from the private network interface to the public network interface is limited by the outbound bandwidth.

B.

Traffic from the public network interface to the private network interface is limited by the outbound bandwidth.

C.

Traffic from the private network interface to the public network interface is limited by the inbound bandwidth.

D.

Traffic from the public network interface to the private network interface is limited by the inbound bandwidth.

Full Access
Question # 15

Which of the following statements is false about hot standby networking?(Select All that Apply)

A.

In load-sharing mode, both firewalls are active. Therefore, if both firewalls synchronize commands to each other, commands may be overwritten or conflict with each other.

B.

In load-sharing mode, both devices process traffic. Therefore, this mode supports more peak traffic than the active/standby or mirroring mode.

C.

In active/standby mode, configuration commands and status information are backed up from the active device to the standby device.

D.

In load-sharing mode, configuration commands can be backed up only from the configuration standby device to the configuration active device.

Full Access
Question # 16

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

A.

Exhaust available bandwidth.

B.

Exhaust server-side resources.

C.

Control network host rights.

D.

Exhaust network device resources.

Full Access
Go to page: