ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











Which of the following features does Huawei NIP intrusion prevention equipment support? (multiple choice)

A.
Virtual patch
A.
Virtual patch
Answers
B.
Mail detection
B.
Mail detection
Answers
C.
SSL traffic detection
C.
SSL traffic detection
Answers
D.
Application identification and control
D.
Application identification and control
Answers
Suggested answer: A, C, D

Regarding the processing process of file overwhelming, which of the following statements is correct?

A.
The file filtering module will compare the application type, file type, and transmission direction of the file identified by the previous module with the file filtering rules configured by the administrator.Then the lookup table performs matching from top to bottom.
A.
The file filtering module will compare the application type, file type, and transmission direction of the file identified by the previous module with the file filtering rules configured by the administrator.Then the lookup table performs matching from top to bottom.
Answers
B.
If all the parameters of Wenzhu can match all file filtering rules, then the module will execute the action of this file filtering rule.
B.
If all the parameters of Wenzhu can match all file filtering rules, then the module will execute the action of this file filtering rule.
Answers
C.
There are two types of actions: warning and blocking.
C.
There are two types of actions: warning and blocking.
Answers
D.
If the file type is a compressed file, then after the file filtering check, the female file will be sent to the file decompression module for decompression and decompression.Press out the original file. If the decompression fails, the file will not be re-filed.
D.
If the file type is a compressed file, then after the file filtering check, the female file will be sent to the file decompression module for decompression and decompression.Press out the original file. If the decompression fails, the file will not be re-filed.
Answers
Suggested answer: B

Which of the following options belong to the keyword matching mode? (multiple choice)

A.
Text
A.
Text
Answers
B.
Regular expressions
B.
Regular expressions
Answers
C.
Community word
C.
Community word
Answers
D.
Custom keywords
D.
Custom keywords
Answers
Suggested answer: A, B

Anti-DDoS defense system includes: management center, detection center and cleaning center.

A.
True155955cc-666171a2-20fac832-0c042c0421
A.
True155955cc-666171a2-20fac832-0c042c0421
Answers
B.
False
B.
False
Answers
Suggested answer: A

Regarding HTTP behavior, which of the following statements is wrong?

A.
HTTP POST is generally used to send information to the server through a web page, such as forumposting x form submission, username I password login.
A.
HTTP POST is generally used to send information to the server through a web page, such as forumposting x form submission, username I password login.
Answers
B.
When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.
B.
When the file upload operation is allowed, the alarm threshold and blocking threshold can be configured to control the size of the uploaded file.
Answers
C.
When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management And block behavior.
C.
When the size of the uploaded or downloaded file and the size of the content of the POST operation reach the alarm threshold, the system will generate log information to prompt the device management And block behavior.
Answers
D.
When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST operate.
D.
When the uploaded or downloaded file size, POST operation content size reaches the blocking threshold, the system will only block the uploaded or downloaded file, POST operate.
Answers
Suggested answer: D

For Huawei USG600 products, which of the following statements about mail filtering configuration is correct?

A.
Cannot control the number of received email attachments
A.
Cannot control the number of received email attachments
Answers
B.
When the spam processing action is an alert, the email will be blocked and an alert will be generated
B.
When the spam processing action is an alert, the email will be blocked and an alert will be generated
Answers
C.
You can control the size of the attachment of the received mail
C.
You can control the size of the attachment of the received mail
Answers
D.
Cannot perform keyword filtering on incoming mail
D.
Cannot perform keyword filtering on incoming mail
Answers
Suggested answer: C

Anti DDoS seven-layer defense can work from the dimensions of interface-based defense, global defense and defense object-based defense.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

For the basic mode of HTTP Flood source authentication, which of the following options are correct?

(multiple choice)

A.
The basic mode can effectively block the access from the Feng Explor client.
A.
The basic mode can effectively block the access from the Feng Explor client.
Answers
B.
The bot tool does not implement a complete HTTP protocol stack and does not support automaticredirection, so the basic mode can effectively defend against HTTP Flood attacks.hit.
B.
The bot tool does not implement a complete HTTP protocol stack and does not support automaticredirection, so the basic mode can effectively defend against HTTP Flood attacks.hit.
Answers
C.
When there is an HTTP proxy server in the network, the firewall will add the IP address of theproxy server to the whitelist, but it will recognize the basic source of the zombie host.The certificate is still valid.
C.
When there is an HTTP proxy server in the network, the firewall will add the IP address of theproxy server to the whitelist, but it will recognize the basic source of the zombie host.The certificate is still valid.
Answers
D.
The basic mode will not affect the user experience, so the defense effect is higher than the enhanced mode.
D.
The basic mode will not affect the user experience, so the defense effect is higher than the enhanced mode.
Answers
Suggested answer: A, B

What are the typical technologies of anti-virus engines (multiple choice)

A.
First package detection technology
A.
First package detection technology
Answers
B.
Heuristic detection technology
B.
Heuristic detection technology
Answers
C.
Decryption technology
C.
Decryption technology
Answers
D.
File reputation detection technology 5
D.
File reputation detection technology 5
Answers
Suggested answer: A, B, D

In the big data intelligent security analysis platform, it is necessary to collect data from data sources, and then complete a series of actions such as data processing, detection and analysis, etc. do. Which of the following options does not belong to the action that needs to be completed in the data processing part?

155955cc-666171a2-20fac832-0c042c0422

A.
Data preprocessing
A.
Data preprocessing
Answers
B.
Threat determination
B.
Threat determination
Answers
C.
Distributed storage
C.
Distributed storage
Answers
D.
Distributed index
D.
Distributed index
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37