Huawei H12-724 Practice Test - Questions Answers
List of questions
Related questions
If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)
Regarding firewall and IDS, which of the following statements is correct?
Which of the following types of attacks are DDoS attacks? 2I
Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers A lot of time to research and analyze and produce corresponding defense methods.
The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?
The whitelist rule of the firewall anti-virus module is configured as ("*example*, which of the following matching methods is used in this configuration?
UDP is a connectionless protocol. UDP Flood attacks that change sources and ports will cause performance degradation of network devices that rely on session forwarding.
Even the session table is exhausted, causing the network to be paralyzed. Which of the following options is not a preventive measure for UDP Flood attacks?
Regarding the processing flow of file filtering, which of the following statements is wrong?
Huawei WAF products are mainly composed of front-end execution, back-end central systems and databases. Among them, the database mainly stores the front-end detection rules and black Whitelist and other configuration files.
Misuse detection is through the detection of similar intrusions in user behavior, or those that use system flaws to indirectly violate system security rules To detect intrusions in the system. Which of the following is not a feature of misuse detection 2
Question