Free H12-722 Exam Braindumps (page: 6)

Page 6 of 45

Based on the anti-virus gateway of streaming scan, which of the following descriptions is wrong?

  1. Rely on state detection technology and protocol analysis technology
  2. The performance is higher than the agent-based method
  3. The cost is smaller than the agent-based approach
  4. The detection rate is higher than the proxy-based scanning method

Answer(s): D



Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

  1. The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source
  2. For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify
    The legitimacy of the source IP.
  3. In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process It will consume the TCP connection resources of the OINS cache server.
  4. Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.

Answer(s): C



Regarding the anti-spam response code, which of the following statements is wrong?

  1. The response code will vary depending on the RBL service provider.
    155955cc-666171a2-20fac832-0c042c046
  2. USG treats mails that match the answer code as spam.
  3. If the response code is not returned or the response code is not configured on the USG, the mail is released.
  4. The response code is specified as 127.0.0.1 in the second system.

Answer(s): D



The configuration command to enable the attack prevention function is as follows; n [FW] anti-ddos syn-flood source-detect
[FW] anti-ddos udp-flood dynamic-fingerprint-learn
[FW] anti-ddos udp-frag-flood dynamic fingerprint-learn [FW] anti-ddos http-flood defend alert-rate 2000
[Fwj anti-ddos htp-flood source-detect mode basic
Which of the following options is correct for the description of the attack prevention configuration? (multiple choice)

  1. The firewall has enabled the SYN Flood source detection and defense function
  2. The firewall uses the first packet drop to defend against UDP Flood attacks.
  3. HTTP Flood attack defense uses enhanced mode for defense
  4. The threshold for HTTP Flood defense activation is 2000.

Answer(s): A,D



Page 6 of 45



Post your Comments and Discuss Huawei H12-722 exam with other Community members:

Dan commented on September 13, 2024
Going through
Anonymous
upvote