ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

Block
Block
Declare
Declare
Alarm
Alarm
Execution
Execution
Suggested answer: A, C
asked 18/09/2024
Eduardo Lapuente
42 questions

Question 2

Report Export Collapse

Regarding firewall and IDS, which of the following statements is correct?

The firewall is a bypass device, used for fine-grained detection
The firewall is a bypass device, used for fine-grained detection
IDS is a straight line equipment and cannot be used for in-depth inspection
IDS is a straight line equipment and cannot be used for in-depth inspection
The firewall cannot detect malicious operations or misoperations by insiders
The firewall cannot detect malicious operations or misoperations by insiders
IDS cannot be linked with firewall
IDS cannot be linked with firewall
Suggested answer: C
asked 18/09/2024
ANIKET PATEL
36 questions

Question 3

Report Export Collapse

Which of the following types of attacks are DDoS attacks? 2I

Single packet attack
Single packet attack
Floating child attack
Floating child attack
Malformed message attack
Malformed message attack
Snooping scan attack
Snooping scan attack
Suggested answer: B
asked 18/09/2024
Amar Lojo
30 questions

Question 4

Report Export Collapse

Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers A lot of time to research and analyze and produce corresponding defense methods.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Vangelis Gouloutis
38 questions

Question 5

Report Export Collapse

The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

Huawei H12-724 image Question 5 32937 09182024192736000000

The firewall will first check the blacklist entries and then the whitelist entries.
The firewall will first check the blacklist entries and then the whitelist entries.
Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the website.
Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the website.
The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.
The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.
The default action means that all websites are allowed to visit. So the configuration is wrong here.
The default action means that all websites are allowed to visit. So the configuration is wrong here.
Suggested answer: B
asked 18/09/2024
Santanu Roy
34 questions

Question 6

Report Export Collapse

The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?

Prefix matching
Prefix matching
Suffix matching155955cc-666171a2-20fac832-0c042c043
Suffix matching155955cc-666171a2-20fac832-0c042c043
Keyword matching
Keyword matching
Exact match
Exact match
Suggested answer: C
asked 18/09/2024
107 gleann na ri charles
34 questions

Question 7

Report Export Collapse

UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.

Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?

UDP fingerprint learning
UDP fingerprint learning
Associated defense
Associated defense
current limit
current limit
First packet discarded
First packet discarded
Suggested answer: D
asked 18/09/2024
Irving Indian
30 questions

Question 8

Report Export Collapse

Regarding the processing flow of file filtering, which of the following statements is wrong?

After the file decompression fails, the file will still be filtered. .
After the file decompression fails, the file will still be filtered. .
The application identification module can identify the type of application that carries the file.
The application identification module can identify the type of application that carries the file.
Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.
Protocol decoding is responsible for analyzing the file data and file transmission direction in the data stream.
The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data
The file type recognition module is responsible for identifying the true type of the file and the file extension based on the file data
Suggested answer: A
asked 18/09/2024
Keith Barker
33 questions

Question 9

Report Export Collapse

Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black Whitelist and other configuration files.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Samy Mameri
28 questions

Question 10

Report Export Collapse

Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules To detect intrusions in the system. Which of the following is not a feature of misuse detection 2

Easy to implement
Easy to implement
Accurate detection
Accurate detection
Effective detection of impersonation detection of legitimate users
Effective detection of impersonation detection of legitimate users
Easy to upgrade
Easy to upgrade
Suggested answer: C
asked 18/09/2024
Jyothiswaroop Rajan
27 questions
Total 367 questions
Go to page: of 37
Search

Related questions