This page was exported from Latest Exam Prep [ http://certify.vceprep.com ] Export date:Sat Sep 21 12:35:56 2024 / +0000 GMT ___________________________________________________ Title: [Sep-2022] 100% Actual H12-722_V3.0 dumps Q&As with Explanations Verified & Correct Answers [Q112-Q128] --------------------------------------------------- [Sep-2022] 100% Actual H12-722_V3.0 dumps Q&As with Explanations Verified & Correct Answers H12-722_V3.0 Dumps with Free 365 Days Update Fast Exam Updates QUESTION 112Regarding the sequence of file filtering technology processing flow, which of the following is correct?(1) The security policy is applied as permit(2) Protocol decoding(3) File type recognition(4) Application recognition(5) File filtering  (1)(2)(3)(4)(5)  (1)(4)(2)(3)(5)  (1)(2)(4)(3)(5)  (1)(3)(2)(4)(5) QUESTION 113Which of the following iterations is correct for the description of the management center?  The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary The stream is reported to the management server for report presentation.  The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.  The data collector and management server support distributed deployment and centralized deployment.Centralized deployment has good scalability.  The management center is divided into two parts: management server and teaching data collector. QUESTION 114The following commands are configured on the Huawei firewall:[USG] firewall defend ip-fragment enableWhich of the following situations will be recorded as an offensive behavior? (multiple choice)  DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,  DF bit is 023, MF bit is 1 or Fragment Offset is not 0,  DF bit is 0, and Fragment Offset + Length> 65535.  The DF bit is 1, and Fragment Ofset + Length <65535. QUESTION 115Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?  The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source  For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify The legitimacy of the source IP.  In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process It will consume the TCP connection resources of the OINS cache server.  Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild. QUESTION 116When a data file hits the whitelist of the firewall’s anti-virus module, the firewall will no longer perform virus detection on the file.  True  False QUESTION 117In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?  Long-term latency and collection of key data.  Leak the acquired key data information to a third party of interest  Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user’s terminal to become a springboard for attacks.  The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet. QUESTION 118Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)  The detection rate is higher than the flow scanning method  System overhead will be relatively small  Cache all files through the gateway’s own protocol stack  More advanced operations such as decompression, shelling, etc. can be performed QUESTION 119Which of the following types of attacks are DDoS attacks? 2I  Single packet attack  Floating child attack  Malformed message attack  Snooping scan attack QUESTION 120Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)  Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.  Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.  With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.  Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations. QUESTION 121Which of the following options is not a feature of big data technology?  The data boy is huge  A wide variety of data  Low value density  Slow processing speed QUESTION 122Which of the following technology, administrators can according to business requirements, to scale to achieve load sharing of business flow?  Resource pool mechanism  weighting mechanism  load balancing  Hot Standby QUESTION 123Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve For confidentiality, integrity and availability. ,  True  False QUESTION 124In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed In the high-performance engine. Which of the following is not the content security detection function supported by this product?  Application recognition and perception  URL classification and filtering  Video content filtering  Intrusion prevention QUESTION 125If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses It is the stream scanning method.  True  False QUESTION 126In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)  Warning  Block and push the page  A warning dialog box pops up  All access to the client is prohibited QUESTION 127Which of the following descriptions about viruses and Trojans are correct? (multiple choices)  Viruses are triggered by computer users  Viruses can replicate themselves  Trojan horses are triggered by computer users  Trojans can replicate themselves QUESTION 128Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)  Local upgrade  Manual upgrade  Online upgrade  Automatic upgrade  Loading … Verified H12-722_V3.0 dumps Q&As - 2022 Latest H12-722_V3.0 Download: https://www.vceprep.com/H12-722_V3.0-latest-vce-prep.html --------------------------------------------------- Images: https://certify.vceprep.com/wp-content/plugins/watu/loading.gif https://certify.vceprep.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-09-19 14:23:02 Post date GMT: 2022-09-19 14:23:02 Post modified date: 2022-09-19 14:23:02 Post modified date GMT: 2022-09-19 14:23:02