Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

H12-722 Exam Dumps - Huawei HCIP-Security Questions and Answers

Question # 24

Regarding firewall and IDS, which of the following statements is correct?

Options:

A.

The firewall is a bypass device, used for fine-grained detection

B.

IDS is a straight line equipment and cannot be used for in-depth inspection

C.

The firewall cannot detect malicious operations or misoperations by insiders

D.

IDS cannot be linked with firewall

Buy Now
Question # 25

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

Options:

A.

Warning

B.

Block and push the page

C.

A warning dialog box pops up

D.

All access to the client is prohibited

Buy Now
Question # 26

Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?

Options:

A.

It can identify the application that carries the file, the file transfer direction, the file type and the file extension.

B.

Even if the file type is modified, it can also identify the true type of the file

C.

It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.

D.

It supports filtering the contents of compressed files after decompression. "

Buy Now
Question # 27

Which of the following options describes the IntelliSense engine IAE incorrectly?

Options:

A.

lAE's content security detection functions include application identification and perception, intrusion prevention, and Web application security.

B.

Full English name: intelligent Awareness Engine.

C.

The core of C.IAE is to organically centralize all content security-related detection functions.

D.

The security detection of the IAE engine is parallel, using a message-based file processing mechanism, which can receive file fragments and perform security checks.

Buy Now
Question # 28

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

Options:

A.

DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,

155955cc-666171a2-20fac832-0c042c047

B.

DF bit is 023, MF bit is 1 or Fragment Offset is not 0,

C.

DF bit is 0, and Fragment Offset + Length> 65535.

D.

The DF bit is 1, and Fragment Ofset + Length <65535.

Buy Now
Question # 29

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

Options:

A.

Data analysis, data classification, post-processing

B.

Data processing, data classification, post-processing

C.

Data processing, attack classification, post-processing

D.

Data processing, data classification, attack playback

Buy Now
Exam Code: H12-722
Exam Name: Huawei Certified ICT Professional - Constructing Service Security Network (HCIP-Security-CSSN V3.0)
Last Update: Feb 23, 2025
Questions: 177
H12-722 pdf

H12-722 PDF

$25.5  $84.99
H12-722 Engine

H12-722 Testing Engine

$28.5  $94.99
H12-722 PDF + Engine

H12-722 PDF + Testing Engine

$40.5  $134.99