Free H12-724 Exam Braindumps (page: 40)

Page 39 of 92

For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense.
Which of the following descriptions is correct?

  1. TCP proxy means that the firewall is deployed between the client and the server.
    When the SYI packet sent by the client to the server passes through the firewall, the The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.
  2. During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is When the document flow is heavy, the performance requirements of the firewall are often high.
  3. TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233
  4. TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.

Answer(s): B



Which of the following technologies can achieve content security? (multiple choice)

  1. Web security protection
  2. Global environment awareness
  3. Sandbox and big data analysis
  4. Intrusion prevention

Answer(s): A,B,C,D



Which of the following iterations is correct for the description of the management center?

  1. The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary
    The stream is reported to the management server for report presentation.
  2. The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.
  3. The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.
  4. The management center is divided into two parts: management server and teaching data collector.

Answer(s): D



The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

  1. True
  2. False

Answer(s): A






Post your Comments and Discuss Huawei H12-724 exam with other Community members:

H12-724 Discussions & Posts