There are many people searching for free dumps for H12-722-enu exam, now we will share Huawei HCNP-Security H12-722-enu exam free questions and answers here for you to practice, you also can contact us to get more free questions. And if we update, we will share update version to you.
New feedback: Just passed H12-722-ENU HCNP-Security-CSSN (Constructing Service Security Network) on May.28.2018. number of test questions: 170 Q&As
1. If the user's FTP operation matches the FTP filtering policy, which actions can be performed? (Multiple choice)
A. Blocking
B. Announcement
C. Alerts
D. Execution
Answer: AC
2. About firewalls and IDS, which of the following is true?
A. Firewall is a bypass device for fine-grained detection
B. IDS is a straight-path device and can't perform depth detection
C. Firewall is unable to detect insider malicious operation or misoperation
D. IDS can't interact with the firewall
Answer: C
3. Which of the following attack types is DDoS attack?
A. Single package attack
B. Traffic attack
C. Malformed packet attack
D. Snooping scanning attack
Answer: B
4. Why APT attacks are difficult to defend? Part of the reason is that they use zero-day loopholes to attack. This zero-day loopholes usually takes a lot of time to research and analyze and make corresponding defense methods.
A. True
B. False
Answer: A
5. The following figure shows the configuration of the URL filtering configuration file. Which of the following statements is true about this configuration?
A. The firewall will check the blacklist first and then check the whitelist.
B. Assume that user visit www.exzample.com, which is part of Humanities and Social Networking category. At this time, the user cannot access the site.
C. The user visit the website www.exzample.com. When there is no black and white list of hits, the predefined URL category entry is next queried.
D. The default action means that all websites allow access. Therefore, this configuration error.
Answer: B
6. The whitelist rule of the firewall antivirus module is configured as *example*. Which of the following matches is used in this configuration?
A. Prefix matching
B. Suffix matching
C. Keyword matching
D. exact match
Answer: C
7. UDP is a connectionless protocol. A large number of UDP flood attacks cause the performance of network devices that rely on session forwarding to be degraded and even the session table is exhausted, causing network congestion.
Which of the following options does not prevent UDP flood attacks?
A. UDP fingerprint learning
B. Associated defense
C. Current limiting
D. First packet discarded
Answer: D
8. Regarding the process of file filtering, which of the following statements is wrong?
A. After the file extraction fails, the file will still be filtered.
B. The application identification module can identify the type of application hosting the file.
C. Protocol decoding is responsible for parsing the file data and file transfer directions in the data stream.
D. The file type identification module is responsible for identifying the real type of the file and the extension of the file based on the file data
Answer: A
9. Huawei WAF products mainly consist of implementing front-end, back-end central systems and databases. The database mainly stores the front-end detection rules and black and white list configuration files.
A. True
B. False
Answer: A
10. Misuse detection discovers intrusion activity in system by detecting similar behaviors of user intrusions, or by detecting violations of system security rules indirectly by exploiting system flaws.
Which of the following is not misuse detection feature?
A. Easy to implement
B. Accurate detection
C. Effective detection of impersonation of legitimate users
D. Easy to upgrade
Answer: C
11. Huawei NIP6000 products have zero-setting network parameters and plug-and-play functionality because interfaces pairs only work on Layer 2 and do not need to set IP address.
A. True
B. False
Answer: A
12. During the infiltration phase of APT attack, which of the following attack behaviors will the attacker generally have?
A. Long-term latency and key data collection.
B. Leaks key data information to interested third parties.
C. By phishing emails, attachments carrying a 0day vulnerability cause the user's terminal to become a springboard for attacks.
D. The attacker sends C&C attack or other remote command to the infected host, cause the attack to spread horizontally across the intranet.
Answer: D
13. What are the risks to information security caused by unauthorized access? (Multiple choices)
A. Confidentiality
B. Integrity
C. Availability
D. recoverability
Answer: AB
14. Network attacks are classified into two types: single-packet attacks and traffic-based attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks and special packet attacks.
A. True
B. False
Answer: A
15. Which of the following attacks are belong to attacks against Web servers? (Multiple choices)
A. Website fishing fraud
B. Website Trojan
C. SQL injection
D. Cross-site scripting attacks
Answer: CD
16. Which of the following is correct configuration strategy for anti-virus policy?
1. Load feature library
2. Configure security policy and reference AV profile
3. Apply and activate license
4. Configure AV Profile
5. Submit
A. 3 -> 1 -> 4 -> 2 -> 5
B. 3 -> 2 -> 4 -> 1 -> 5
C. 3 -> 2 -> 1 -> 4 -> 5
D. 3 -> 1 -> 2 -> 4 -> 5
Answer: A
17. In the security protection system of cloud era, reforms must be carried out in advance, in the event, and afterwards, and continuous improvement and development of closed loops must be formed.
Which of the following key points should be fulfilled in "in the matter"? (Multiple choices)
A. Vulnerability information
B. Defense in depth
C. Offensive and defensive situation
D. Counterattacks Hackers
Answer: BD
18. Huawei NIP6000 products provide carrier-grade high-reliability mechanisms at multiple levels to ensure the stable operation of the equipment.
Which of the following options belong to the reliability of the network? (Multiple choices)
A. Hot Standby
B. Power 1+1 redundancy backup
C. Hardware Bypass
D. Link-group
Answer: AD
19. Which of the following are the common causes of IPS detection failures? (Multiple choices)
A. IPS policy is not submitted for compilation
B. Policy IDs with incorrect associations between IPS policy domains
C. IPS function is not enabled
D. Bypass function in IPS is turned off
Answer: ABC
20. About the description of the file filtering technology in the USG6000, which statement is wrong?
A. It can identify the application hosting the file, the file transfer direction, the file type, and the file extension.
B. Even if the file type is modified, it can recognize the true type of the file.
C. It can identify the types of files transmitted by itself and can block, alert and announce specific type of files.
D. It supports the filtering of the decompressed contents of the compressed file.
Answer: C
21. About the anti-virus gateways based on flow-scanning, which of the following statement is wrong?
A. Depends on state detection technology and protocol analysis technology
B. Performance is higher than proxy-based
C. The cost is smaller than proxy-based
D. The detection rate is higher than proxy-scanning-based
Answer: D
22. For the description of the DNS Request Flood attack, which of the following option is correct?
A. DNS request flood attack on the cache server can use the redirection mode to verify the validity of the source.
B. For the DNS request flood attack of the authorization server, you can trigger the client to send a DNS request with a TCP packet to verify the validity of the source IP address.
C. In the process of source authentication, the firewall triggers the client to send a DNS request with TCP packets to verify the validity of the source IP, but it will consume the TCP connection resources of the DNS cache server to some extent.
D. Redirection can be implemented not only for the source IP address of the attacked domain name, but also for the destination IP address of the attacked domain name.
Answer: C
23. Which of the following statements is wrong about anti-spam answerback codes?
A. The answerback code will be different for different RBL service providers.
B. USG treats the mail that matches the answerback code as spam.
C. Release the message if the answerback code does not reply to or the replied answerback code is not configured on the USG.
D. The answerback code is uniformly set as 127.0.0.1.
Answer: D
24. The configuration commands for enabling the attack defense function are as follows:
[FW] anti-ddos syn-flood source-detect
[FW] anti-ddos udp-flood dynamic-fingerprint-learn
[FW] anti-ddos udp-frag-flood dynamic-fingerprint-learn
[FW] anti-ddos http-flood defend alert-rate 2000
[FW] anti-ddos http-flood source-detect mode basic
Which of the following are the correct descriptions of the attack prevention configuration? (Multiple Choices)
A. SYN Flood source detection and prevention function is enabled on the firewall.
B. The firewall uses the first packet discard to defense the UDP flood attacks.
C. HTTP flood attack defense uses enhanced mode for defense.
D. The threshold value enabled by HTTP Flood defense is 2000.
Answer: AD
25. The application behavior control configuration file takes effect immediately after reference, without configuring the submission.
A. True
B. False
Answer: A