H12-724-ENU HCIP-Security (Fast track) V1.0 Exam Dumps

Page 1

Exam:H12-724

DownloadvalidHCIP-SecurityH12-724dumpstopassyourexameasily 1/5
Title: https://www.passcert.com/H12-724-ENU.html HCIP-Security(Fasttrack) V1.0

1.Businessaccompanyingis-Aspecialaccesscontrolmethod,accordingtotheuser'saccesslocation, accesstime,accessmethodandterminalusetograntdesignatedinvestmentlimits,amongwhichthe physicalconnectioncanbedividedinto3Class,excludingwhichofthefollowingaccessmethods?

AWiredaccess

BWirelessaccess

CVPNAccess

D8021XAccess

Answer:D

2Whichofthefollowingfilescanthesandboxdetect?(multiplechoice)

Awwwfile

B.PEfile

CPicturefile

D.Mail

Answer:A,B,C

3ViewontheswitchAgileController-CampusThepolicyissuedbytheserverisasfollows: Forthisstrategy,whichofthefollowingoptionsarecorrect?(Multiplechoice)

ACommonuserUserscanaccessInternetwwwH

BVIPUserscanaccessInternetwH

CVIPCanvisitMailServerH

DCommonuserUserscanaccessMailSeverresource

Answer:B,C,D

4Identityauthenticationdetermineswhethertoallowaccessbyidentifyingtheidentityoftheaccess deviceoruser

ATrue

BFalse

Answer:A

5.RegardingtheenhancedmodeinHTTPFloodsourceauthentication,whichofthefollowingdescriptions arecorrect?Multiplechoices

A.Enhancedmodereferstotheauthenticationmethodusingverificationcode.

BSomebotshavearedirectionfunction,orthefreeproxyusedduringtheattacksupportstheredirection function,whichleadstothefailureofthebasicmodeofdefenseEffective,enhancedmodecaneffectively defend

CTheenhancedmodeissuperiortothebasicmodeintermsofuserexperience

DEnhancedmodesupportsallHTTPFloodsourceauthenticationfields"

Answer:A,B

6Cloudsandboxreferstodeployingthesandboxinthecloudandprovidingremotedetectionservicesfor tenants

Theprocessincludes:

1Reportsuspiciousfiles

2/5
DownloadvalidHCIP-SecurityH12-724dumpstopassyourexameasily

2.Retrospectiveattack

3Firewalllinkagedefense

4.Prosecutioninthecloudsandbox

Fortheorderingoftheprocess,whichofthefollowingoptionsiscorrect?

A1-3-4-2

B1-4-2-3

C1-4-3-2

D3-1-4-2:

Answer:C

7Thefollowingisthe8021Xaccesscontrolswitchconfiguration:

[S5720]dot1xauthentication-methodeap

[S5720-GigabitEthernet0/0/1]portlink-typeaccess

[S5720-GigabitEthemet0/0/1]portdefaultvlan11

[S5720-GigabitEthernet0/0/1]authenticationdot1x

AssumingthatGE0/0/1isconnectedtouser1anduser2throughtheHUB,whichofthefollowingoptions iscorrect?

A.Afteruser1isauthenticated,user2canaccessnetworkresourceswithoutauthentication

BUser1andUser2mustbeindividuallyauthenticatedbeforetheycanaccessnetworkresources

CGE0/0/1doesnotneedtoenabledot1X

DNeitheruser1noruser2canpasstheauthenticationandaccessnetworkresources

Answer:A

8TianyuNeiansweredtheroleofsafetyfilteringtechnology,whichofthefollowingisstillcorrect? (multiplechoice)

AFilefilteringcanreducetheriskofmaliciouscodeexecutionandvirusinfectionintheinternalnetwork byblockingthetransmissionoffixedtypesoffiles,anditcanalsopreventPreventemployeesfrom leakingcompanyconfidentialdocumentstotheInternet

B.Contentfilteringcanpreventthedisclosureofconfidentialinformationandthetransmissionofillegal information

C.TheapplicationbehaviorcontrolfunctioncanfinelycontrolcommonHTTPbehaviorsandFTP behaviors

D.Mailfilteringreferstothemanagementandcontrolofmailsendingandreceiving,includingpreventing thefloodingofspamandanonymousemails,andcontrollingthesendingandreceivingofillegalemails

Answer:A,B,C,D

9Inthesecurityprotectionsystemofthecloudera,reformsneedtobecarriedoutinthethreestages before,duringandaftertheevent,andaclosed-loopcontinuousimprovementshouldbeformed

Anddevelopment

Whichofthefollowingkeypointsshouldbedonein"things"?(multiplechoice)

AVulnerabilityintelligence

BDefenseinDepth

COffensiveanddefensivesituation

DFightbackagainsthackers

DownloadvalidHCIP-SecurityH12-724dumpstopassyourexameasily 3/5

Answer:B,D

10.InthescenarioofSACGlinkageinbypassmode,onlythetrafficinitiatedbytheterminaluserwillpass throughthefirewall,andtheserverwillreturntotheterminalinuse

ThetrafficdoesnotneedtogothroughthefirewallyForthefirewall,itbelongstothescenarioof inconsistenttrafficbackandforthpaths,thisneedstoturnoffthesessionstatecheckfunction

ATrue

BFalse

Answer:A

11DeployedbyanenterprisenetworkmanagerAgileController-CampuswithSACGLater;Identity authenticationissuccessfulbutcannotaccessthepost-authenticationdomain,Thisphenomenonmaybe causedbyanyreason?(Multiplechoice)

A.Aseriousviolationwillprohibitaccesstothepost-authenticationdomain.

BTheaccesscontrollistofthepost-authenticationdomainhasnotbeendeliveredSACG

C.ALCThenumberofrulesissuedistoomany,andalotoftimeisrequiredtomatch,causinginterruption ofaccessservices

D.AgileController-CampusWrongpost-authenticationdomainresourcesareconfiguredontheserver.

Answer:A,B,D

12Intheconstructionofinformationsecurity,theintrusiondetectionsystemplaystheroleofamonitorIt monitorstheflowofkeynodesintheinformationsystem

In-depthanalysistodiscoversecurityincidentsthatareoccurring Whichofthefollowingareitscharacteristics?

AIDScanbelinkedwithfirewallsandswitchestobecomeapowerful"assistant"offirewalls,whichcan betterandmoreaccuratelycontrolaccessbetweendomains

BItisimpossibletocorrectlyanalyzethemaliciouscodedopedintheallowedapplicationdatastream CUnabletodetectmaliciousoperationsormisoperationsfrominternalkillings

D.Cannotdoin-depthinspection

Answer:A

13WhichwaycanNACAgentupgradepackagebedeployed?

A.ByIPaddresses

BByterminaltype

C.Byaccount

DByuserinformation

Answer:A

14Whichofthefollowingisthecorrectconfigurationideafortheanti-virusstrategy?

1Loadthefeaturelibrary

2ConfiguresecuritypolicyandreferenceAVProfile

3Applyandactivatethelicense

4ConfigureAVProfile

5Submit

DownloadvalidHCIP-SecurityH12-724dumpstopassyourexameasily 4/5

A.3->1->4->2->5

B3->2->4->1->5

C.3->2->1->4->5

D3->1->2->4->5

Answer:A

15WhichofthefollowingisthedefaultportnumberofPortalauthenticationservice?

A1812

B1813

C50200

D50300

Answer:A,C

16.RegardingWLAN,whichofthefollowingdescriptionsiscorrect?

AWLANIstoadopt80211TechnicalWiFi

B.WLANTherearetwobasicarchitectures:FATAPwithAC+FITAP

CAC+FATAPThearchitectureissuitableformediumandlargeusescenarios

D.AC+FITAPAutonomousnetworkarchitecture

Answer:B

17IftheprocessingstrategyforSMTPvirusfilesissettoalert,whichofthefollowingoptionsiscorrect?

AGeneratelogsanddiscard

BGeneratelogsandforwardthem

CDeletethecontentoftheemailattachment

DAddannouncementandgeneratelog

Answer:B

18Whichofthefollowingoptionsbelongtotheupgrademethodoftheanti-virussignaturedatabaseof HuaweiUSG6000products?(multiplechoice)

ALocalupgrade

B.Manualupgrade

COnlineupgrade

D.Automaticupgrade

Answer:A,C

5/5
DownloadvalidHCIP-SecurityH12-724dumpstopassyourexameasily

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.