ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Which of the following files can the sandbox detect? (multiple choice)

A.
www file
A.
www file
Answers
B.
PE file
B.
PE file
Answers
C.
Picture file
C.
Picture file
Answers
D.
Mail
D.
Mail
Answers
Suggested answer: A, B, C

The administrator has defined two key words that need to be recognized on the firewall: the weight of the keyword x is 2, and the weight of the key y is 3: defined The alarm interval value from the content is 5, and the blocking threshold value is 10. If the device detects that there is a secondary key space x in the webpage created by the user, the two keywords are Y; Regarding the weight value and monthly household visits to Heshun Street, is the following statement correct?

A.
The weight value is 8, you can visit the web page
A.
The weight value is 8, you can visit the web page
Answers
B.
The weight value is 10, and the page cannot be accessed
B.
The weight value is 10, and the page cannot be accessed
Answers
C.
The weight value is 8, the page cannot be accessed
C.
The weight value is 8, the page cannot be accessed
Answers
D.
The weight value is 10, you can ask the web page before
D.
The weight value is 10, you can ask the web page before
Answers
Suggested answer: A

Tianyu Nei answered the role of safety filtering technology, which of the following is still correct?

(multiple choice)

A.
File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent Prevent employees from leaking company confidential documents to the Internet.
A.
File filtering can reduce the risk of malicious code execution and virus infection in the internal network by blocking the transmission of fixed types of files, and it can also prevent Prevent employees from leaking company confidential documents to the Internet.
Answers
B.
Content filtering can prevent the disclosure of confidential information and the transmission of illegal information
B.
Content filtering can prevent the disclosure of confidential information and the transmission of illegal information
Answers
C.
The application behavior control function can finely control common HTTP behaviors and FTPbehaviors.
C.
The application behavior control function can finely control common HTTP behaviors and FTPbehaviors.
Answers
D.
Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.
D.
Mail filtering refers to the management and control of mail sending and receiving, including preventing the flooding of spam and anonymous emails, and controlling the sending and receiving of illegal emails.
Answers
Suggested answer: A, B, C, D

Fage attack means that the original address and target address of TOP are both set to the IP address of a certain victim. This behavior will cause the victim to report to it.

SYN-ACK message is sent from the address, and this address sends back an ACK message and creates an empty connection, which causes the system resource board to occupy or target The host crashed.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

In the following options, which of the two attacks use similar attack methods, they will generate a large number of useless response packets, occupying network bandwidth, Consume equipment resources?

A.
Fraggle and Smurt
A.
Fraggle and Smurt
Answers
B.
Land and Smurf
B.
Land and Smurf
Answers
C.
Fraggle and Land155955cc-666171a2-20fac832-0c042c0423
C.
Fraggle and Land155955cc-666171a2-20fac832-0c042c0423
Answers
D.
Teardrop and Land35
D.
Teardrop and Land35
Answers
Suggested answer: A

Attacks on the Web can be divided into three types of attacks on the client, server, or communication channel.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

With the continuous development of the network and the rapid development of applications, companies are making users more and more frequently start to transfer files on the network.

Virus threats are becoming more and more serious. Only by rejecting the virus outside the network can data security and system stability be guaranteed. So, which of the following are What harm might be caused by illness? (multiple choices)

A.
Threaten the security of the user's host and network.
A.
Threaten the security of the user's host and network.
Answers
B.
Some viruses can be used as intrusion tools, such as Trojan horse viruses,
B.
Some viruses can be used as intrusion tools, such as Trojan horse viruses,
Answers
C.
Control the host computer's accumulated limit and the user's data, and some viruses may even cause damage to the host's hardware.
C.
Control the host computer's accumulated limit and the user's data, and some viruses may even cause damage to the host's hardware.
Answers
D.
Can easily pass the defense of Huawei USG6000 products
D.
Can easily pass the defense of Huawei USG6000 products
Answers
Suggested answer: A, B, C

Which of the following options describes the IntelliSense engine IAE incorrectly?

A.
lAE's content security detection functions include application identification and perception, intrusion prevention, and Web application security.
A.
lAE's content security detection functions include application identification and perception, intrusion prevention, and Web application security.
Answers
B.
Full English name: intelligent Awareness Engine.
B.
Full English name: intelligent Awareness Engine.
Answers
C.
The core of C.IAE is to organically centralize all content security-related detection functions.
C.
The core of C.IAE is to organically centralize all content security-related detection functions.
Answers
D.
The security detection of the IAE engine is parallel, using a message-based file processing mechanism, which can receive file fragments and perform security checks.
D.
The security detection of the IAE engine is parallel, using a message-based file processing mechanism, which can receive file fragments and perform security checks.
Answers
Suggested answer: D

The main attack prevention technologies of Huawei USG6000 products include: source detection, fingerprint learning and associated defense.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

The core technology of content security lies in anomaly detection, and the concept of defense lies in continuous monitoring and analysis.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 367 questions
Go to page: of 37