New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H19-376 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H19-376_V1.0

H19-376 Exam Dumps - HCS-Pre-sales-IP(Security)

Go to page:
Question # 9

Regarding the application identification of Huawei's USG6000 next-generation firewall, what is the correct statement?

A.

When the application characteristics change, you need to upgrade the firewall software.

B.

Ability to identify applications based on statistical features and associated features

C.

Identify Shuliang more than 6000

D.

Ability to distinguish between different functions of the application, such as distinguishing uploads and downloads of network disk applications.

Full Access
Question # 10

NGFW SSL VPN does not currently support the following user authentication methods.

A.

Fingerprint authentication

B.

One-time password authentication, such as SecurID token authentication

C.

Account password authentication, including local database, RADIUS, LDAP, AD

D.

Digital certificate authentication, digital certificate + USB Key certification

Full Access
Question # 11

Which interfaces are included in the NGFW logical interface?

A.

LOOPBACK

B.

VLANIF

C.

NULL

D.

ETH-TRUNK

E.

Subinterface

Full Access
Question # 12

Huawei Anti-Ddos ICMP Flood defense usually uses source detection to defend against

A.

True

B.

False

Full Access
Question # 13

Anti-Ddos HTTP source detection Meta Refresh method can be applied to AJAX (Ajax) objects

A.

Applicable only to image objects

B.

Fully applicable

C.

Applicable only to text objects

D.

Not applicable

Full Access
Question # 14

After the Huawei sandbox detects the threat, how to deal with it:

A.

The sandbox will take the initiative to clear the part of the virus sample, similar to anti-virus software.

B.

The sandbox is a straight-line device that can directly kill the threat sample. C. The sandbox needs to be linked with other security devices to block the threat.

C.

You can use MTA to process the mail, so you can block the threat directly after detecting the damage.

Full Access
Question # 15

Which of the following types of packet capture tasks can be supported on ATIC?

A.

Mirror capture

B.

Globally discard packets

C.

ACL capture

D.

Protection object attack packet capture

E.

The protection object is caught abnormally.

Full Access
Go to page: