[2022] Pass Huawei H12-722 Exam Updated 180 Questions [Q82-Q106]

Share

[2022] Pass  Huawei H12-722 Exam Updated 180 Questions

Get 2022 Updated Free Huawei H12-722 Exam Questions & Answer

NEW QUESTION 82
For the URL is http://www.abcd.com:8080/news/education.aspx?name=tom&age=20, where is the path option?

  • A. http://www.abcd.com:8080/news/education.aspx
  • B. /news/education.aspx
  • C. http://www.abcd.com:8080
  • D. /news/education.aspx?name=tom&age=20

Answer: B

 

NEW QUESTION 83
Traditional firewalls have weak application layer analysis and processing capabilities, and cannot correctly analyze malicious code that is doped in the allowable application data stream. Many attacks or malicious behavior often use firewall open application data streams to cause damage, resulting in application layers threat can penetrate the firewall.

  • A. FALSE
  • B. TRUE

Answer: B

 

NEW QUESTION 84
The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall.

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 85
Tianyu Nei answered the role of safety filtering technology, which of the following is still correct? (multiple choice)

  • A. The application behavior control function can finely control common HTTP behaviors and FTP behaviors.
  • B. Content filtering can prevent the disclosure of confidential information and the transmission of illegal information
  • C. Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.
  • D. File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent Prevent employees from leaking company confidential documents to the Internet.

Answer: A,B,C,D

 

NEW QUESTION 86
Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main Which four major components are included?

  • A. Incident extraction, intrusion analysis, intrusion response and remote management.
  • B. Incident recording, intrusion analysis, intrusion response and remote management.
  • C. Event extraction, intrusion analysis, reverse intrusion and remote management.
  • D. Incident extraction, intrusion analysis, intrusion response and on-site management.

Answer: A

 

NEW QUESTION 87
Which of the following is correct about enhanced mode in HTTP Flood Source authentication? (Multiple selection)

  • A. The enhanced mode support all HTTP flood source authentication scenarios.
  • B. The enhanced mode is better than the basic mode in the user experience.
  • C. Some bots have redirection function, or the free agent used during the attack supports the redirection function, resulting in the failure of defense of the basic mode. The enhanced mode can effectively defend.
  • D. Enhanced mode refers to the use of verification code authentication.

Answer: C,D

 

NEW QUESTION 88
IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.
Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?

  • A. IPS unifies IDS and firewall
  • B. Common IPS deployment modes are in-line deployment,
  • C. IPS is an intrusion detection system that can block real-time intrusions when found
  • D. IPS must use bypass deployment in the network

Answer: D

 

NEW QUESTION 89
Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)

  • A. The severity level of the configuration is too high
  • B. The protocol selection technique is correct
  • C. The direction is turned on, but no specific direction is selected
  • D. Direction is not enabled

Answer: A,B,C

 

NEW QUESTION 90
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack.
This kind of zero-day hole usually requires flowers
A lot of time to research and analyze and produce corresponding defense methods.

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 91
Which aspects of information security will be caused by unauthorized access? (multiple choice)

  • A. Integrity
  • B. Recoverability
  • C. Confidentiality
  • D. Availability

Answer: A,C

 

NEW QUESTION 92
The following figure is the diagram which shows the firewall and sandbox system linkage detection file.

The Web Reputation feature is enabled on the firewall, and Site A is set as a trusted site and Site B is set as a suspicious site. Which of the following statements is correct?

  • A. Assume that Site A is an unknown website, the administrator cannot detect the website's traffic file.
  • B. When the user visits the Site B, although the firewall will extract the file and send it to the detection node, the user can still visit the Site B normally during the detection process.
  • C. The files which the users obtain from Site A and Site B are sent to the detection node for detection.
  • D. After the detection node detects a suspicious file, it not only informs the firewall in the figure, but also informs other connected network devices.

Answer: D

 

NEW QUESTION 93
Which of the following signature properties cannot be configured for IP custom signatures?

  • A. Packet length
  • B. Direction
  • C. protocol
  • D. ID

Answer: A

 

NEW QUESTION 94
In the big data intelligent security analysis platform, it is necessary to collect data from the data source, and then complete a series of actions such as data processing, detection and analysis.
Which of the following options does not belong to the data processing part that needs to be completed?

  • A. Threat assessment
  • B. Distributed Index
  • C. Data preprocessing
  • D. Distributed storage

Answer: A

 

NEW QUESTION 95
When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.

  • A. True
  • B. False

Answer: B

 

NEW QUESTION 96
An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .
Which of the following is the entry that the firewall will match when looking up the website URL?

  • A. www.abc. example
  • B. www. abc. example. com
  • C. example. com
  • D. example

Answer: D

 

NEW QUESTION 97
Regarding intrusion detection I defense equipment, which of the following statements are correct? (multiple choice)

  • A. It cannot effectively prevent the virus from spreading from the Internet to the intranet.
  • B. Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc.
    from flooding and spreading to the intranet.
  • C. The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services Experience.
  • D. Ability to quickly adapt to threat changes

Answer: B,C,D

 

NEW QUESTION 98
A business administrator wants to prevent employees from accessing shopping websites during business hours. A URL filtering configuration file was then configured to select the shopping site in the predefined category as blocked. However, employee A can still use the company's network to shop online during the lunch break.
What are the possible reasons for the following? (Multiple choices)

  • A. The administrator did not submit the configuration after configuration.
  • B. The administrator did not set the time period to 9:00-18:00 daily.
  • C. The shopping site does not belong to the predefined shopping site category.
  • D. The administrator did not apply the URL filtering profile to the security policy.

Answer: A,C,D

 

NEW QUESTION 99
The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.

  • A. True
  • B. False

Answer: B

 

NEW QUESTION 100
Huawei NIP6000 products have zero-setting network parameters and plug-and-play functions, because the interfaces and interface pairs only work on layer 2 without Set the IP address.

  • A. True
  • B. False

Answer: A

 

NEW QUESTION 101
SQI injection attacks generally have the following steps:
1, Privilge Escalation
2, Get the data in the database
3, To determine whether there is a vulnerability in the webpage
4, Determine the database type
Which of the following options is correct for the ordering of these steps?

  • A. 3, 4, 1, 2
  • B. 4, 2, 1, 3
  • C. 4, 1, 2, 3
  • D. 3, 4, 2, 1

Answer: D

 

NEW QUESTION 102
Which of the following options is correct about the file reputation technology in the anti-virus engine?

  • A. File reputation is calculated by calculating the full-text MD5 of the file under test and matching it with the local reputation MD5 cache for virus detection.
  • B. The local reputation MD5 cache only has static cache and needs to be updated regularly
  • C. The update of the file reputation database is achieved only through linkage with the sandbox.
  • D. File reputation database can only be upgraded by manual upgrade

Answer: A

 

NEW QUESTION 103
Fage attack means that the original address and target address of TOP are both set to the IP address of a certain victim. This behavior will cause the victim to report to it.
SYN-ACK message is sent from the address, and this address sends back an ACK message and creates an empty connection, which causes the system resource board to occupy or target The host crashed.

  • A. True
  • B. False

Answer: B

 

NEW QUESTION 104
The following commands are configured on the Huawei firewall:
[USG] firewall defend ip-fragment enable
Which of the following situations will be recorded as an attack? (Multiple Choices)

  • A. DF bit is 1 and the MF bit is also 1 or the Fragment Offset is not 0.
  • B. DF bit is 0, the MF bit is 1 or the Fragment Offset is not 0.
  • C. DF bit is 1 and Fragment Offset + Length < 65535.
  • D. DF bit is 0 and Fragment Offset + Length > 65535.

Answer: A,D

 

NEW QUESTION 105
If the user's FTP operation matches the FTP filtering policy, which actions can be performed? (Multiple choice)

  • A. Blocking
  • B. Execution
  • C. Announcement
  • D. Alerts

Answer: A,D

 

NEW QUESTION 106
......

Verified H12-722 exam dumps Q&As with Correct 180 Questions and Answers: https://www.actual4exams.com/H12-722-valid-dump.html