ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











The status code in the HTTP response message indicates the type of the response message, andthere are many possible values. Which of the following status codes represents the client requestThe resource does not exist?

A.
400.
A.
400.
Answers
B.
404
B.
404
Answers
C.
200
C.
200
Answers
D.
503
D.
503
Answers
Suggested answer: B

Which three aspects should be considered in the design of cloud platform security solutions?

(multiple choice)

A.
Infrastructure security
A.
Infrastructure security
Answers
B.
Tenant security
B.
Tenant security
Answers
C.
How to do a good job in management, operation and maintenance
C.
How to do a good job in management, operation and maintenance
Answers
D.
Hardware maintenance
D.
Hardware maintenance
Answers
Suggested answer: A, B, C

Regarding the anti-spam local black and white list, which of the following statements is wrong?

A.
The black and white list is matched by extracting the destination IP address of the SMTP connection
A.
The black and white list is matched by extracting the destination IP address of the SMTP connection
Answers
B.
The black and white list is matched by the sender's dns suffix
B.
The black and white list is matched by the sender's dns suffix
Answers
C.
The black and white list is matched by extracting the source IP address of the SMTP connection 155955cc-666171a2-20fac832-0c042c0419
C.
The black and white list is matched by extracting the source IP address of the SMTP connection 155955cc-666171a2-20fac832-0c042c0419
Answers
D.
If the source IP address of the SMTP connection matches the blacklist, the connection will be blocked
D.
If the source IP address of the SMTP connection matches the blacklist, the connection will be blocked
Answers
Suggested answer: B

Which of the following options is not a feature of Trojan horses?

A.
Not self-replicating but parasitic
A.
Not self-replicating but parasitic
Answers
B.
Trojans self-replicate and spread
B.
Trojans self-replicate and spread
Answers
C.
Actively infectious
C.
Actively infectious
Answers
D.
The ultimate intention is to steal information and implement remote monitoring
D.
The ultimate intention is to steal information and implement remote monitoring
Answers
Suggested answer: C

The security management system is only optional, and anti-virus software or anti-hacking technology can be a good defense against network threats.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Regarding the sequence of the mail transmission process, which of the following is correct?

A.
The sender PC sends the mail to the designated SMTP Server.
A.
The sender PC sends the mail to the designated SMTP Server.
Answers
B.
The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail 3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver 4. The recipient sends an email.
B.
The sender SMTP Server encapsulates the mail information in an SMTP message and sends it to the receiver SMTP Server according to the destination address of the mail 3. The sender SMTP Server encapsulates the mail information in an SMTP message according to the destination address of the mail and sends it to the receiver POP3/MAP Senver 4. The recipient sends an email.
Answers
C.
1->2->3
C.
1->2->3
Answers
D.
1->2->4,
D.
1->2->4,
Answers
E.
1->3->2
E.
1->3->2
Answers
F.
1->4->3
F.
1->4->3
Answers
Suggested answer: B

Which of the following protocols can be used to construct attack messages for special control message attacks? (multiple choice)

A.
ICMP protocol
A.
ICMP protocol
Answers
B.
UDP protocol
B.
UDP protocol
Answers
C.
CIP protocol
C.
CIP protocol
Answers
D.
FTP protocol
D.
FTP protocol
Answers
Suggested answer: A, B, C

In order to protect the security of data transmission, more and more websites or companies choose to use SSL to encrypt transmissions in the stream. About using Huawei NIP6000 The product performs threat detection on (SSL stream boy, which of the following statements is correct?

A.
NIP0OO does not support SSL Threat Detection.
A.
NIP0OO does not support SSL Threat Detection.
Answers
B.
The traffic after threat detection is sent directly to the server without encryption
B.
The traffic after threat detection is sent directly to the server without encryption
Answers
C.
NIP can directly crack and detect SSL encryption.
C.
NIP can directly crack and detect SSL encryption.
Answers
D.
After the process of "decryption", "threat detection", and "encryption"
D.
After the process of "decryption", "threat detection", and "encryption"
Answers
Suggested answer: D

If a company wants to detect image files, Shellcode code files and PDF files, which of the following types of sandboxes can be used? (More 155955cc-666171a2-20fac832-0c042c0420 select)

A.
PDF heuristic sandbox ja$
A.
PDF heuristic sandbox ja$
Answers
B.
PE heuristic sandbox
B.
PE heuristic sandbox
Answers
C.
Web heuristic sandbox
C.
Web heuristic sandbox
Answers
D.
Heavyweight sandbox (virtual execution)
D.
Heavyweight sandbox (virtual execution)
Answers
Suggested answer: A, C, D

The administrator of a certain enterprise wants employees of Yangzhi to visit the shopping website during working hours. So a URL filtering configuration file is configured to divide the predefined The shopping website in the category is selected as blocked. But employee A can still use the company's network to shop online during lunch break. Then what are the following possible reasons some?

A.
The administrator has not set the time to vote every day from 9:00 to 18:00
A.
The administrator has not set the time to vote every day from 9:00 to 18:00
Answers
B.
The shopping website does not belong to the predefined shopping website category
B.
The shopping website does not belong to the predefined shopping website category
Answers
C.
The administrator did not submit the configuration after completing the configuration.
C.
The administrator did not submit the configuration after completing the configuration.
Answers
D.
The administrator has not applied the URL pass-through configuration file to the security policy.
D.
The administrator has not applied the URL pass-through configuration file to the security policy.
Answers
Suggested answer: B, C, D
Total 367 questions
Go to page: of 37