Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

H12-724 Exam Dumps - HCIP-Security (Fast track) V1.0

Question # 4

In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?

A.

Local account authentication

B.

Anonymous authentication

C.

AD Account Verification

D.

MAC Certification

Full Access
Question # 5

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

A.

DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0,

155955cc-666171a2-20fac832-0c042c047

B.

DF bit is 023, MF bit is 1 or Fragment Offset is not 0,

C.

DF bit is 0, and Fragment Offset + Length> 65535.

D.

The DF bit is 1, and Fragment Ofset + Length <65535.

Full Access
Question # 6

Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)

A.

Visitors can use their mobile phone number to quickly register an account

B.

The administrator can assign different permissions to each visitor

C.

Reception staff cannot create guest accounts

D.

There is a violation of the guest account, and the administrator cannot retrospectively

Full Access
Question # 7

In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.

A.

True

B.

False

Full Access
Question # 8

Visitors can access the network through their registered account. Which of the following is not an account approval method?

A.

Exemption from approval

B.

Administrator approval

C.

Receptionist approval

D.

Self-approved by visitors

Full Access
Question # 9

A network adopts 802. 1X To authenticate access users, the access control equipment is deployed at the convergence layer, and after the deployment is completed, it is used on the access control equipment t-aa The command test is successful, but the user cannot access the network. The failure may be caused by the following reasons? (Multiple choice)

A.

The aggregation layer device is not configured RADIUS Certification template.

B.

Agile Controller-Campus The switch is not added on NAS equipment.

C.

Connect to the terminal on the device to open 802.1X Function.

D.

The Layer 2 link is used between the access device and the aggregation device, and it is not turned on 802 Instrument transparent transmission function

Full Access
Question # 10

Which of the following options is not a challenge brought by mobile office?

A.

The mobile office platform is safe and reliable and goes online quickly.

B.

Users can access the network safely and quickly.

C.

Unified terminal management and fine control.

D.

Network gateway deployment

Full Access
Question # 11

Configure the following commands on the Huawei firewall:

[USG] interface G0/0/1

[USG] ip urpf loose allow-defult-route acl 3000

Which of the following options are correct? (multiple choice)

A.

For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly

B.

For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall

If it does not exist, the message will be rejected.

C.

For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall

If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.

155955cc-666171a2-20fac832-0c042c0427

D.

For the configuration of the default route, and at the same time matching the parameter allow-defult-route, if the source address of the message is in the FIB table of the firewall

If it does not exist in the l0e check, the packet cannot pass the URPF check.

Full Access
Question # 12

Use BGP protocol to achieve diversion, the configuration command is as follows

[sysname] route-policy 1 permit node 1

[sysname-route-policy] apply community no-advertise

[sysname-route-policy] quit

[sysname]bgp100

155955cc-666171a2-20fac832-0c042c04

29

[sysname-bgp] peer

[sysname-bgp] import-route unr

[sysname- bgpl ipv4-family unicast

[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export

[sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community

[sysname-bgp-af-ipv4] quit

[sysname-bgp]quit

Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)

A.

Use BGP to publish UNR routes to achieve dynamic diversion.

B.

After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.

C.

You also need to configure the firewall ddos ​​bgp-next-hop fib-filter command to implement back-injection.

D.

The management center does not need to configure protection objects. When an attack is discovered, it automatically issues a traffic diversion task.

Full Access
Question # 13

Which of the following options is not a special message attack?

A.

ICMP redirect message attack) 0l

B.

Oversized ICMP packet attack

C.

Tracert packet attack

D.

IP fragment message item

Full Access
Question # 14

The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall

A True

B. False

Full Access
Question # 15

Which of the following options is not a cyber security threat caused by weak personal security awareness?

A.

Disclosure of personal information

B.

Threats to the internal network

C.

Leaking corporate information

D.

Increasing the cost of enterprise network operation and maintenance

Full Access
Question # 16

Which of the following statements about IPS is wrong?

A.

The priority of the coverage signature is higher than that of the signature in the signature set.

B.

When the "source security zone" is the same as the "destination security zone", it means that the IPS policy is applied in the domain.

C.

Modifications to the PS policy will not take effect immediately. You need to submit a compilation to update the configuration of the IPS policy.

D.

The signature set can contain either predefined signatures or custom signatures. 832335

Full Access
Question # 17

Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.

A.

True

B.

False

Full Access
Question # 18

Regarding scanning and snooping attacks, which of the following descriptions is wrong?

A.

Scanning attacks include address scanning and port scanning.

B.

It is usually the network detection behavior before the attacker launches the real attack.

155955cc-666171a2-20fac832-0c042c0424

C.

The source address of the scanning attack is real, so it can be defended by adding direct assistance to the blacklist.

D.

When a worm virus breaks out, it is usually accompanied by an address scanning attack, so scanning attacks are offensive.

Full Access
Question # 19

Regarding the definition of WIPS/WIDS, which of the following statements is correct?

A.

WIDS Is a wireless intrusion prevention system

B.

WIPS Wireless intrusion detection system

C.

WIDS Is a wireless intrusion countermeasure system

D.

WIPS Is a wireless intrusion prevention system

Full Access
Question # 20

Which of the following attacks are attacks against web servers? (multiple choices)

A.

Website phishing deception

B.

Website Trojan

C.

SQL injection

D.

Cross-site scripting attacks 2335

Full Access
Question # 21

When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?

A.

Deploy the main DB

B.

Deploy image DBO

C.

Deploy witness DB

D.

Deploy MC and SM dual machine backup

Full Access
Question # 22

When using local guest account authentication, usually use(Portal The authentication method pushes the authentication page to the visitor. Before the user is authenticated, when the admission control device receives the HTTP The requested resource is not Portal Server authentication URL When, how to deal with the access control equipment.

A.

Discard message

B.

URL Address redirected to Portal Authentication page

C.

Direct travel

D.

Send authentication information to authentication server

Full Access
Question # 23

Which of the following options is not a feature of big data technology?

A.

The data boy is huge

B.

A wide variety of data

C.

Low value density

D.

Slow processing speed

Full Access
Question # 24

The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

A.

True

B.

False

Full Access
Question # 25

Regarding the mail content filtering configuration of Huawei USG6000 products, which of the following statements is wrong?.

A.

Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.

B.

When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o

C.

When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.

D.

The attachment size limit is for a single attachment, not for the total size of all attachments.

Full Access
Question # 26

Which is correct about the following Policy Center troubleshooting process?

A.

Hardware fault-> connection fault-> NAC client fault-> Policy Center server fault

B.

connection fault-> Hardware fault-> NAC client fault-> Policy Center server fault

C.

Hardware fault-> connection fault-> Policy Center server fault-> NAC client fault

D.

hardware fault-> NAC client fault-> connection fault-> Policy Center server fault

Full Access
Question # 27

After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.

A.

True

B.

False

Full Access
Question # 28

For the description of URPF technology, which of the following options are correct? (multiple choice)

A.

The main function is to prevent network attacks based on source address spoofing.

B.

In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.

C.

The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.

D.

Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.

Full Access
Question # 29

About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?

A.

User isolation between groups means that users in different groups cannot communicate, but internal users in the same group can communicate

B.

Isolation within a user group means that users within the same group cannot communicate with each other.

C.

The user isolation function is related to the same AP Layer 2 packets between all wireless users on the Internet cannot be forwarded to each other

D.

Intra-group isolation and inter-group isolation cannot be used at the same time

Full Access
Question # 30

Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following

What is the content of the intrusion detection knowledge base?

A.

Complete virus sample

B.

Complete Trojan Horse

C.

Specific behavior patterns

D.

Security Policy

Full Access
Question # 31

Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)

A.

If most end users work in one area and a few end users work in branch offices, centralized deployment is recommended.

B.

If most end users are concentrated on--Offices in several regions, and a small number of end users work in branches. Distributed deployment is recommended.

C.

If end users are scattered in different geographical locations, a distributed deployment solution is recommended.

D.

If end users are scattered in different regions, a centralized deployment solution is recommended.

Full Access
Question # 32

In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

A.

The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.

B.

Agile Controller-Campus Need to be manually created"~anonymous"account number.

C.

By default, the access control and policy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.

D.

Administrators cannot delete anonymous accounts"~anonymous*.

Full Access
Question # 33

According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)

A.

WhoTo determine the ownership of the access device(Company standard,BYOD Wait)

B.

WhoseTo determine the identity of the access person(member I, Visitors, etc.)

C.

How Determine the access method(Wired, wireless, etc.)

D.

WhatTo determine the access device(PC,iOS Wait)

Full Access
Question # 34

In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If you need to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?

A.

MAC Certification

B.

82.1 Certification

C.

Portal Certification

D.

MAC(prioritized

Full Access
Question # 35

Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks. Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.

Wen attack.

A.

True

B.

False

Full Access
Question # 36

When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)

A.

Warning

B.

Block

C.

Declare

D.

Operate by weight

Full Access
Question # 37

Secure email is Any ffice Solution for corporate office 0A The killer application provided, it provides powerful email business capabilities and rich email strategies. For secure mail, which of the following descriptions are correct? (Multiple choice)

A.

Through the mail client, you can connect No or Exchange Mail system.

B.

Support automatic mail transmission encryption, transmission encryption method supports a full range of IPSec/TLS protocol.

C.

Online survey of attached documents is not supported.

D.

Support MAP4/SMTP/EAS Send and receive emails with standard protocols such as, and support real-time email push.

Full Access
Question # 38

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment

Anti-Virus, IPS, spam detection and other equipment.

A.

True

155955cc-666171a2-20fac832-0c042c0414

B.

False

Full Access
Question # 39

Regarding the description of keywords, which of the following is correct? (multiple choice)

A.

Keywords are the content that the device needs to recognize during content filtering.

B.

Keywords include predefined keywords and custom keywords.

C.

The minimum length of the keyword that the text can match is 2 bytes. ,

D.

Custom keywords can only be defined in text mode.

Full Access
Question # 40

In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.

A.

True

B.

False

Full Access
Question # 41

In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?

A.

PADIUS Used on the client and 802.1X Information such as user names and passwords are passed between switches.

B.

PADIUS Used in 802.1X Switch and AAA Information such as user name and password are passed between servers.

C.

PADIUS Used for Portal Server pushes to users Web page.

D.

PADIUS Used for server to SACG Security policy issued by the device

Full Access
Question # 42

The administrator has made the following configuration:

1. The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.

2. The action of overwriting signature ID3000 is an alarm.

A.

The action of signing iD3000 is an alarm

B.

The action of signing ID3000 is to block

C.

Unable to determine the action of signature ID3000

D.

The signature set is not related to the coverage signature

Full Access
Question # 43

Which of the following options is not a defense against HTTP Flood attacks?

A.

HTTP Flood source authentication

B.

HTTP source statistics

C.

URI source fingerprint learning function

D.

Baseline learning

Full Access
Question # 44

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

A.

The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source

B.

For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify

The legitimacy of the source IP.

C.

In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process

It will consume the TCP connection resources of the OINS cache server.

D.

Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Full Access
Question # 45

For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)

A.

Authentication data flow has passed SACG filter.

B.

TSM No hardware is added to the system SACG equipment.

C.

SACG Enable the default inter-domain packet filtering.

D.

Privileges are misconfigured IP

Full Access
Question # 46

The configuration command to enable the attack prevention function is as follows; n

[FW] anti-ddos syn-flood source-detect

[FW] anti-ddos udp-flood dynamic-fingerprint-learn

[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn

[FW] anti-ddos http-flood defend alert-rate 2000

[Fwj anti-ddos htp-flood source-detect mode basic

Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)

A.

The firewall has enabled the SYN Flood source detection and defense function

B.

The firewall uses the first packet drop to defend against UDP Flood attacks.

C.

HTTP Flood attack defense uses enhanced mode for defense

D.

The threshold for HTTP Flood defense activation is 2000.

Full Access
Question # 47

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

A.

Planting malware

B.

Vulnerability attack

C.

Web application attacks

D.

Brute force

Full Access
Question # 48

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)

A.

Portal server IP

B.

Portal page URL

C.

shared-key

D.

Portal Protocol version

Full Access
Question # 49

Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device

Collect it in the log for continuous learning and optimization.

A.

True

155955cc-666171a2-20fac832-0c042c0433

B.

False

Full Access
Question # 50

Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)

A.

MAC Certification is based on MAC The address is an authentication method that controls the user's network access authority. It does not require the user to install any client software.

B.

MAC Bypass authentication is first performed on the devices that are connected to the authentication 802 1X Certification;If the device is 802. 1X No response from authentication, re-use MAC The authentication method verifies the legitimacy of the device.

C.

MAC During the authentication process, the user is required to manually enter the user name or password.

D.

MAC The bypass authentication process does not MAC The address is used as the user name and password to automatically access the network.

Full Access
Question # 51

The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).

A.

True

B.

False

Full Access
Question # 52

Fage attack means that the original address and target address of TOP are both set to the IP address of a certain victim. This behavior will cause the victim to report to it.

SYN-ACK message is sent from the address, and this address sends back an ACK message and creates an empty connection, which causes the system resource board to occupy or target

The host crashed.

A.

True

B.

False

Full Access
Question # 53

If you combine security defense with big data technology, which of the following statements are correct? (multiple choice)

A.

In the learning process, you should start from collecting samples, analyze their characteristics and then perform machine learning.

B.

Machine learning only counts a large number of samples, which is convenient for security administrators to view.

C.

In the detection process, the characteristics of unknown samples need to be extracted and calculated to provide samples for subsequent static comparisons.

D.

Security source data can come from many places, including data streams, messages, threat events, logs, etc.

Full Access
Question # 54

Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)

A.

Direction is not enabled

B.

The direction is turned on, but no specific direction is selected

C.

The severity level of the configuration is too high

D.

The protocol selection technique is correct

Full Access
Question # 55

The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?

A.

Prefix matching

B.

Suffix matching

155955cc-666171a2-20fac832-0c042c043

C.

Keyword matching

D.

Exact match

Full Access