Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H19-376 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is H19-376_V1.0

H19-376 Exam Dumps - HCS-Pre-sales-IP(Security)

Question # 4

Huawei's USG6300E series AI firewall has a competitive advantage over its friends. What is wrong with the following description?

A.

Support interface extension

B.

High interface density

C.

Front and rear ventilation

D.

Application protocol processing performance is high

Full Access
Question # 5

Which of the following routing options are IPV6 routing protocols

A.

BGP4+

B.

ISIS6

C.

OSPFv3

D.

RIPv3

E.

BGP4

Full Access
Question # 6

Anti-Ddos solution In the actual server protection scenario, the function that is more prone to misjudgment is

A.

SYN-ACK Flood source detection

B.

TOPN Cache

C.

SYN Flood source detection

D.

DNS format check

Full Access
Question # 7

.Anti-Ddos SYN Flood source detects the TCP destination port of the attack that can defend against

A.

80

B.

23

C.

1234

D.

179

Full Access
Question # 8

The Linux executable type that the Huawei sandbox supports detection is ()?

A.

ELF

B.

DLL

C.

SYS

D.

EXE

Full Access
Question # 9

Regarding the application identification of Huawei's USG6000 next-generation firewall, what is the correct statement?

A.

When the application characteristics change, you need to upgrade the firewall software.

B.

Ability to identify applications based on statistical features and associated features

C.

Identify Shuliang more than 6000

D.

Ability to distinguish between different functions of the application, such as distinguishing uploads and downloads of network disk applications.

Full Access
Question # 10

NGFW SSL VPN does not currently support the following user authentication methods.

A.

Fingerprint authentication

B.

One-time password authentication, such as SecurID token authentication

C.

Account password authentication, including local database, RADIUS, LDAP, AD

D.

Digital certificate authentication, digital certificate + USB Key certification

Full Access
Question # 11

Which interfaces are included in the NGFW logical interface?

A.

LOOPBACK

B.

VLANIF

C.

NULL

D.

ETH-TRUNK

E.

Subinterface

Full Access
Question # 12

Huawei Anti-Ddos ICMP Flood defense usually uses source detection to defend against

A.

True

B.

False

Full Access
Question # 13

Anti-Ddos HTTP source detection Meta Refresh method can be applied to AJAX (Ajax) objects

A.

Applicable only to image objects

B.

Fully applicable

C.

Applicable only to text objects

D.

Not applicable

Full Access
Question # 14

After the Huawei sandbox detects the threat, how to deal with it:

A.

The sandbox will take the initiative to clear the part of the virus sample, similar to anti-virus software.

B.

The sandbox is a straight-line device that can directly kill the threat sample. C. The sandbox needs to be linked with other security devices to block the threat.

C.

You can use MTA to process the mail, so you can block the threat directly after detecting the damage.

Full Access
Question # 15

Which of the following types of packet capture tasks can be supported on ATIC?

A.

Mirror capture

B.

Globally discard packets

C.

ACL capture

D.

Protection object attack packet capture

E.

The protection object is caught abnormally.

Full Access