H12-722-ENU 無料問題集「Huawei HCIP-Security-CSSN(Huawei Certified ICT Professional -Constructing Service Security Network)」

After the IP policy is enabled, some services are found to be inaccessible. Which of the following may be the cause? (Multiple Choice)

正解:A、C 解答を投票する
Which of the following options does not pose security threat to the network?

SQI injection attacks generally have the following steps:
1, Privilge Escalation
2, Get the data in the database
3, To determine whether there is a vulnerability in the webpage
4, Determine the database type
Which of the following options is correct for the ordering of these steps?

The core technology of content security lies in anomaly detection. The idea of defense lies in continuous monitoring and analysis.

Which two of the following options use similar attack methods and generate a large number of useless reply packets, occupying network bandwidth and consuming device resources?

Which of the following is correct regarding the order of the mail transfer process?
1. The sending PC sends the mail to the specified SMTP server.
2. The sender SMTP Server encapsulates the mail information in the SMTP message and sends it to the receiver SMTP according to the destination address of the mail.
Server.
3. The sender SMTP Server encapsulates the mail information in the SMTP message and sends it to the receiver POP3/MAP Server based on the destination address of the mail.
4. Recipients send emails.

Which of the following statements is wrong about HTTP behavior?

There are the following steps in the storage XSS attack
1, The attacker hijacked the user session
2, Attacker submits issues with known JavaScript
3, user login
4, User Request Attacker Problem
5, Server responds to attacker's JavaScript
6, User's browser sends session token to attacker
7, Attacker's JavaScript is executed in the user's browser
Which of the following options is correct for the ordering of these steps?

The anti-tampering technology of Huawei WAF products is based on the cache module. Assuming that user A accesses website B, website B has signs of page tampering. The workflow of the WAF tamper-resistant module has the following steps:
1, WAF uses the cached page to return to the client
2, WAF compares the server page content with the cached page content
3, After the learning is completed, the page content is stored in the cache
4, When the user accesses the web page, the WAF obtains the page content of the server
5, WAF initiates learning mode to learn the page content of the user visiting the website
Which of the following options is correct for the ordering of these steps?

A college user needs are as follows:
1. The environmental traffic is relatively large and can add up to 800M in both directions. Huawei USG6000 series firewalls are deployed at its network nodes.
2. The intranet is divided into student areas, server areas, etc. Users are most concerned about the security of the server area and avoid being attacked by various types of threats.
3. At the same time, some pornographic websites in the student district are prohibited.
The external network is configured as untrust zone on the firewall, and the internal network is configured as trust zone. How to configure the firewall to meet the above requirements? (Multiple choices)

正解:A、B、D 解答を投票する

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡