ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 13

Question list
Search
Search

Related questions











Single-packet attacks are divided into scanning and snooping attacks, malformed packet attacks, and special packet attacks. Ping of death is a special packet attack.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Regarding scanning and snooping attacks, which of the following descriptions is wrong?

A.
Scanning attacks include address scanning and port scanning.
A.
Scanning attacks include address scanning and port scanning.
Answers
B.
It is usually the network detection behavior before the attacker launches the real attack.155955cc-666171a2-20fac832-0c042c0424
B.
It is usually the network detection behavior before the attacker launches the real attack.155955cc-666171a2-20fac832-0c042c0424
Answers
C.
The source address of the scanning attack is real, so it can be defended by adding direct assistance to the blacklist.
C.
The source address of the scanning attack is real, so it can be defended by adding direct assistance to the blacklist.
Answers
D.
When a worm virus breaks out, it is usually accompanied by an address scanning attack, so scanning attacks are offensive.
D.
When a worm virus breaks out, it is usually accompanied by an address scanning attack, so scanning attacks are offensive.
Answers
Suggested answer: D

For compressed files, the virus detection system can directly detect them.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Among the following options, which attack is a malformed packet attack based on the TCR protocol?

A.
Teardrop attack
A.
Teardrop attack
Answers
B.
Ping of Death attack
B.
Ping of Death attack
Answers
C.
IP Spoofng attack
C.
IP Spoofng attack
Answers
D.
Land attack
D.
Land attack
Answers
Suggested answer: D

Which of the following options are common behavioral characteristics of viruses? (multiple choices)

A.
Download and backdoor features
A.
Download and backdoor features
Answers
B.
Information collection characteristics
B.
Information collection characteristics
Answers
C.
Self-hidden features
C.
Self-hidden features
Answers
D.
Network attack characteristics
D.
Network attack characteristics
Answers
Suggested answer: A, B, C, D

Which of the following signature attributes cannot be configured for IP custom signature?

A.
ID
A.
ID
Answers
B.
Message length
B.
Message length
Answers
C.
Agreement
C.
Agreement
Answers
D.
Direction
D.
Direction
Answers
Suggested answer: B

Regarding traditional firewalls, which of the following statements are correct? (multiple choice)

A.
Lack of effective protection against application layer threats.
A.
Lack of effective protection against application layer threats.
Answers
B.
It cannot effectively resist the spread of viruses from the Internet to the intranet.
B.
It cannot effectively resist the spread of viruses from the Internet to the intranet.
Answers
C.
Ability to quickly adapt to changes in threats.
C.
Ability to quickly adapt to changes in threats.
Answers
D.
Unable to accurately control various applications, such as P2P, online games, etc. .
D.
Unable to accurately control various applications, such as P2P, online games, etc. .
Answers
Suggested answer: A, B, D

Regarding the description of intrusion detection technology, which of the following statements is correct?

A.
It is impossible to detect violations of security policies.
A.
It is impossible to detect violations of security policies.
Answers
B.
It can detect all kinds of authorized and unauthorized intrusions.
B.
It can detect all kinds of authorized and unauthorized intrusions.
Answers
C.
Unable to find traces of the system being attacked.
C.
Unable to find traces of the system being attacked.
Answers
D.
is an active and static security defense technology.155955cc-666171a2-20fac832-0c042c0425
D.
is an active and static security defense technology.155955cc-666171a2-20fac832-0c042c0425
Answers
Suggested answer: B

If the regular expression is "abc. de", which of the following will not match the regular expression?

A.
abcde
A.
abcde
Answers
B.
abcdde
B.
abcdde
Answers
C.
abclde
C.
abclde
Answers
D.
abc+de
D.
abc+de
Answers
Suggested answer: A

If the processing strategy for SMTP virus files is set to alert, which of the following options is correct?

A.
Generate logs and discard
A.
Generate logs and discard
Answers
B.
Generate logs and forward them
B.
Generate logs and forward them
Answers
C.
Delete the content of the email attachment
C.
Delete the content of the email attachment
Answers
D.
Add announcement and generate log
D.
Add announcement and generate log
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37