ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

A.
Block
A.
Block
Answers
B.
Declare
B.
Declare
Answers
C.
Alarm
C.
Alarm
Answers
D.
Execution
D.
Execution
Answers
Suggested answer: A, C

Regarding firewall and IDS, which of the following statements is correct?

A.
The firewall is a bypass device, used for fine-grained detection
A.
The firewall is a bypass device, used for fine-grained detection
Answers
B.
IDS is a straight line equipment and cannot be used for in-depth inspection
B.
IDS is a straight line equipment and cannot be used for in-depth inspection
Answers
C.
The firewall cannot detect malicious operations or misoperations by insiders
C.
The firewall cannot detect malicious operations or misoperations by insiders
Answers
D.
IDS cannot be linked with firewall
D.
IDS cannot be linked with firewall
Answers
Suggested answer: C

Which of the following types of attacks are DDoS attacks? 2I

A.
Single packet attack
A.
Single packet attack
Answers
B.
Floating child attack
B.
Floating child attack
Answers
C.
Malformed message attack
C.
Malformed message attack
Answers
D.
Snooping scan attack
D.
Snooping scan attack
Answers
Suggested answer: B

Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers A lot of time to research and analyze and produce corresponding defense methods.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

A.
The firewall will first check the blacklist entries and then the whitelist entries.
A.
The firewall will first check the blacklist entries and then the whitelist entries.
Answers
B.
Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the website.
B.
Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the website.
Answers
C.
The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.
C.
The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.
Answers
D.
The default action means that all websites are allowed to visit. So the configuration is wrong here.
D.
The default action means that all websites are allowed to visit. So the configuration is wrong here.
Answers
Suggested answer: B

The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?

A.
Prefix matching
A.
Prefix matching
Answers
B.
Suffix matching155955cc-666171a2-20fac832-0c042c043
B.
Suffix matching155955cc-666171a2-20fac832-0c042c043
Answers
C.
Keyword matching
C.
Keyword matching
Answers
D.
Exact match
D.
Exact match
Answers
Suggested answer: C

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

A.
UDP fingerprint learning
A.
UDP fingerprint learning
Answers
B.
Associated defense
B.
Associated defense
Answers
C.
current limit
C.
current limit
Answers
D.
First packet discarded
D.
First packet discarded
Answers
Suggested answer: D

Regarding the processing flow of file filtering, which of the following statements is wrong?

A.
After the file decompression fails, the file will still be filtered. .
A.
After the file decompression fails, the file will still be filtered. .
Answers
B.
The application identification module can identify the type of application that carries the file.
B.
The application identification module can identify the type of application that carries the file.
Answers
C.
Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.
C.
Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.
Answers
D.
The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data
D.
The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data
Answers
Suggested answer: A

Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black Whitelist and other configuration files.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules To detect intrusions in the system. Which of the following is not a feature of misuse detection 2

A.
Easy to implement
A.
Easy to implement
Answers
B.
Accurate detection
B.
Accurate detection
Answers
C.
Effective detection of impersonation detection of legitimate users
C.
Effective detection of impersonation detection of legitimate users
Answers
D.
Easy to upgrade
D.
Easy to upgrade
Answers
Suggested answer: C
Total 367 questions
Go to page: of 37