ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











Which of the following options is not a feature of big data technology?

A.
The data boy is huge
A.
The data boy is huge
Answers
B.
A wide variety of data
B.
A wide variety of data
Answers
C.
Low value density
C.
Low value density
Answers
D.
Slow processing speed
D.
Slow processing speed
Answers
Suggested answer: D

The realization of content security filtering technology requires the support of the content security combination license.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Explanation:

155955cc-666171a2-20fac832-0c042c0426

The following figure is a schematic diagram of the detection file of the firewall and the sandbox system linkage.

The Web reputation function is enabled on the firewall, and website A is set as a trusted website and website B is set as a suspicious website.

Which of the following statements is correct

A.
The files obtained by users from website A and website B will be sent to the inspection node for inspection.
A.
The files obtained by users from website A and website B will be sent to the inspection node for inspection.
Answers
B.
When a user visits website B, although the firewall will extract the file and send it to the detection node, the user can still access normally during the detection process Site B.
B.
When a user visits website B, although the firewall will extract the file and send it to the detection node, the user can still access normally during the detection process Site B.
Answers
C.
After the detection node detects the suspicious file, it not only informs the firewall in the figure of the result, but also informs other network devices connected to it.
C.
After the detection node detects the suspicious file, it not only informs the firewall in the figure of the result, but also informs other network devices connected to it.
Answers
D.
Assuming that website A is an unknown website, the administrator cannot detect the traffic file of this website sC
D.
Assuming that website A is an unknown website, the administrator cannot detect the traffic file of this website sC
Answers
Suggested answer: C

Configure the following commands on the Huawei firewall:

[USG] interface G0/0/1 [USG] ip urpf loose allow-defult-route acl 3000

Which of the following options are correct? (multiple choice)

A.
For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly
A.
For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly
Answers
B.
For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall If it does not exist, the message will be rejected.
B.
For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall If it does not exist, the message will be rejected.
Answers
C.
For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.155955cc-666171a2-20fac832-0c042c0427
C.
For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.155955cc-666171a2-20fac832-0c042c0427
Answers
D.
For the configuration of the default route, and at the same time matching the parameter allowdefult- route, if the source address of the message is in the FIB table of the firewall If it does not exist in the l0e check, the packet cannot pass the URPF check.
D.
For the configuration of the default route, and at the same time matching the parameter allowdefult- route, if the source address of the message is in the FIB table of the firewall If it does not exist in the l0e check, the packet cannot pass the URPF check.
Answers
Suggested answer: A, B, C

With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.

Generally, APT attacks can be summarized into four stages:

A.
Collecting Information & Intrusion
A.
Collecting Information & Intrusion
Answers
B.
Long-term lurking & mining
B.
Long-term lurking & mining
Answers
C.
Data breach
C.
Data breach
Answers
D.
Remote control and penetrationRegarding the order of these four stages, which of the following options is correct?
D.
Remote control and penetrationRegarding the order of these four stages, which of the following options is correct?
Answers
E.
2-3-4-1
E.
2-3-4-1
Answers
F.
1-2-4-3
F.
1-2-4-3
Answers
G.
1-4-2-3
G.
1-4-2-3
Answers
H.
2-1-4-3
H.
2-1-4-3
Answers
Suggested answer: C

When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy levelrepresents the number of times the packet can be decrypted.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

In the construction of information security, the intrusion detection system plays the role of a monitor.

It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

A.
IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
A.
IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
Answers
B.
It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
B.
It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
Answers
C.
Unable to detect malicious operations or misoperations from internal killings.
C.
Unable to detect malicious operations or misoperations from internal killings.
Answers
D.
Cannot do in-depth inspection
D.
Cannot do in-depth inspection
Answers
Suggested answer: A

There are several steps in a stored XSS attack

There are several steps in a stored XSS attack

The attacker hijacks the user session

The attacker submits an issue containing known JavaScript

User login

The user requests the attacker's question 5

The server responds to the attacker's JavaScript

The user's browser sends a session token to the attacker

The attacker's JavaScript is executed in the user's browser

For the ordering of these steps, which of the following options is correct?

A.
③②⑦⑥④⑤①
A.
③②⑦⑥④⑤①
Answers
B.
③②④⑤⑦⑥①
B.
③②④⑤⑦⑥①
Answers
C.
③②④⑥⑤⑦①155955cc-666171a2-20fac832-0c042c0428
C.
③②④⑥⑤⑦①155955cc-666171a2-20fac832-0c042c0428
Answers
D.
⑧②⑤⑦④⑥①
D.
⑧②⑤⑦④⑥①
Answers
Suggested answer: B

The virus signature database on the device needs to be continuously upgraded from the security center platform. Which of the following is the website of the security center platform?

A.
sec. huawei. com.
A.
sec. huawei. com.
Answers
B.
support.huaver: com
B.
support.huaver: com
Answers
C.
www. huawei. com
C.
www. huawei. com
Answers
D.
security.. huawei. com
D.
security.. huawei. com
Answers
Suggested answer: A

An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .

Which of the following is the entry that the firewall will match when looking up the website URL?

A.
example
A.
example
Answers
B.
www. abc. example. com
B.
www. abc. example. com
Answers
C.
www.abc. example
C.
www.abc. example
Answers
D.
example. com
D.
example. com
Answers
Suggested answer: A
Total 367 questions
Go to page: of 37