1 / 5

[DumpsBase.com] H12-723 HCNP-Security-CTSS real dumps questions

H12-723 HCNP-Security-CTSS real dumps questions material contains the concept of terminal security, Agile Controller-Campus system installation planning and deployment, terminal authentication system, WLAN network security technology, terminal security troubleshooting and security system operation and maintenance. Get full version of https://www.dumpsbase.com/h12-723.html

Download Presentation

[DumpsBase.com] H12-723 HCNP-Security-CTSS real dumps questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. https://www.dumpsbase.com/h12-723-enu.html Huawei H12-723-ENU Dumps Questions Full Version: V9.02 with 159 Q&AS View Huawei H12-723-ENU Dumps Questions Now! 1.Webmail filter support Intranet users receive mail filtering. A. TRUE B. FALSE page 1 / 5

  2. https://www.dumpsbase.com/h12-723-enu.html Answer: B 2.A network administrator configure IP function, when the signed agreement is http, will only detect http header information. A. TRUE B. FALSE Answer: B 3.URL filtering configure exact match www.test.com/news field, then not meet the URL of the filtering strategy include: A. http://www.test.com/news B. www.test.com/news/ C. WWW.TEST.COM/news D. www.test.com/news.aspx Answer: D 4.Which of the following statement is correct IDS and IPS? A. IDS only supports Inline online deployment B. IPS deployed as a bypass mode is similar to the function of ID C. the core technology of IPS is deep packet inspection and bypass inspection D. With the IPS does not need to deploy a firewall and IDS Answer: B 5.Configuring DNS server of RBL feature on USG, which of the following statement is not correct ? A. must use the DNS server not been DNS hijacking B. must use recursive query DNS server C. DNS server should be reachable IP D. DNS server must listen on port 25 Answer: D 6.What do the common virus behavior characteristics include?(select 3 answers) A. Download and backdoor characteristics B. Information Collection feature C. own hidden feature D. system attacks characteristics Answer: ABC 7.By default, the device file, there is a knowledge base file in device, during the upgrade, the device will automatically update the knowledge base files and backups. A. TRUE B. FALSE Answer: A 8.About the anti-spam local black and white list, which of the following statements is wrong? A. created manually by the user on the USG page 2 / 5

  3. https://www.dumpsbase.com/h12-723-enu.html B. black and white list is matched by the sender's DNS suffix C. black and white list is by extracting the source IP address of the SMTP connection to match D. if the source IP address of the SMTP connection matches the blacklist, blocking the connection Answer: B 9.A university user requirements are as follows: 1. The environmental flow is larger, two-way add up to OOOM, UTM deployed in its network node. 2. The intranet is divided into students zones, server zones, etc., users are most concerned about the security of the server area, to avoid all kinds of the threat of attack. 3. At the same time to ban students area some pornographic websites. In UTM configured Extranet for untrust domain, Intranet for trust domain, how to deploy the UTM strategy? (Select 2 answers) A. can be directly under the global open AV, PS protective function, URL filtering function, then it can be realized B. Outbound direction only open AV, IPS protective function for server areas, protected server C. inboud direction only open AV, IPS protective function for server areas, protected server D. Outbound direction open URL filtering function for the entire campus network , and filtering of part classification website Answer: CD 10.Which of the following description is incorrect against server loophole security threats ? A. worms using application software loophole to spread wantonly, consume network bandwidth and destroy important data. B. hackers, malicious employee use loophole to attack or invade enterprise servers, business secrets were tampered, damaged and theft . C. As long as the system software update in time for system loophole problems can be effectively solved. D. The Internet has made application software loophole to spread rapidly, making loophole easier to become targets of attack. Answer: C 11.The greater Virus Scan rating value, the higher the virus detection rate, but the smaller the probability of false positives. A. TRUE B. FALSE Answer: B 12.After opening IP strategy, found part of the business fails, what are the possible reasons ?( Choose 2 answers ) A. message through the firewall only one direction B. the same message repeatedly through the firewall C. IP omission D. heavy traffic cause Bypass features enabled Answer: AB page 3 / 5

  4. https://www.dumpsbase.com/h12-723-enu.html 13.Which of the following behaviors IPS can not detect? A. Virus B. Worm C. Spam D. DOS Answer: C 14.About WEB URL filtering technology audit function, which of the following description is correct? (Choose 3 answers) A. URL audit function is used to record the user's HTTP Internet behavior as the basis for the audit. B. The user can configure the web type to be audited, WEB types to distinguish with file extensions, including html, jsp, aspx, etc. C. can audit user HTTP access in the specific content of the Post, as a user Internet censorship. D. internal users access to the specified type of WEB resource, the firewall will be logged and sent to log server. Answer: ABD 15.URL filtering, according to the classification of the remote or local classification, the user can create multiple urls strategy, determines the corresponding processing action in URL strategies, a URL strategy was applied to the domain, which can realize the corresponding URL filtering. A. TRUE B. FALSE Answer: A 16.For security priority application environment, should be closed Huawei firewall UTM overload protection function. A. TRUE B. FALSE Answer: A 17.In SA detection technology, which feature detection matching method does not include? A. single packet match B. IP match C. multi-Pack match D. multi-stream match Answer: B 18.Which of the following statement is not correct about application and identification of knowledge base upgrade? A. When USG device unable to connect to the Internet, you can choose local upgrade B. When the USG devices can connect to the Internet, can upgrade manually and automatically• C. The upgrade process of abnormal will not be able to return to the original Knowledge base page 4 / 5

  5. https://www.dumpsbase.com/h12-723-enu.html D. You can configure the automatic save function, after saving the upgrade application control is configured as system configuration Answer: C 19.Administrator creates the correct IPS strategy, applied to domain or inter-domain , but found that no matter in the IPS signature set movement is blocking or alarm, when the invasion attack, only produce the alarm.. What is the reason for this problem? A. Set IPS work mode in the IPS global parameters for alarm B. did not select the correct domain C. did not configure corresponding IPS strategy D. congigure Firewall running mode for Firewall mode Answer: A 20.URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers. A. TRUE B. FALSE Answer: A DumpsBase Promotion Online New Site Promotion. Save 27% OFF money+ 40 points. More exams promotion could get from promotion page. page 5 / 5 Powered by TCPDF (www.tcpdf.org)

More Related