ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 14

Add to Whishlist

List of questions

Question 131

Report Export Collapse

Which of the following options is not a feature of big data technology?

Become a Premium Member for full access
  Unlock Premium Member

Question 132

Report Export Collapse

The realization of content security filtering technology requires the support of the content security combination license.

Become a Premium Member for full access
  Unlock Premium Member

Question 133

Report Export Collapse

The following figure is a schematic diagram of the detection file of the firewall and the sandbox system linkage.

Huawei H12-724 image Question 133 33065 09182024192736000000

The Web reputation function is enabled on the firewall, and website A is set as a trusted website and website B is set as a suspicious website.

Which of the following statements is correct

Become a Premium Member for full access
  Unlock Premium Member

Question 134

Report Export Collapse

Configure the following commands on the Huawei firewall:

[USG] interface G0/0/1 [USG] ip urpf loose allow-defult-route acl 3000

Which of the following options are correct? (multiple choice)

Become a Premium Member for full access
  Unlock Premium Member

Question 135

Report Export Collapse

With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.

Generally, APT attacks can be summarized into four stages:

Become a Premium Member for full access
  Unlock Premium Member

Question 136

Report Export Collapse

When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy levelrepresents the number of times the packet can be decrypted.

Become a Premium Member for full access
  Unlock Premium Member

Question 137

Report Export Collapse

In the construction of information security, the intrusion detection system plays the role of a monitor.

It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

Become a Premium Member for full access
  Unlock Premium Member

Question 138

Report Export Collapse

There are several steps in a stored XSS attack

There are several steps in a stored XSS attack

The attacker hijacks the user session

The attacker submits an issue containing known JavaScript

User login

The user requests the attacker's question 5

The server responds to the attacker's JavaScript

The user's browser sends a session token to the attacker

The attacker's JavaScript is executed in the user's browser

For the ordering of these steps, which of the following options is correct?

Become a Premium Member for full access
  Unlock Premium Member

Question 139

Report Export Collapse

The virus signature database on the device needs to be continuously upgraded from the security center platform. Which of the following is the website of the security center platform?

Become a Premium Member for full access
  Unlock Premium Member

Question 140

Report Export Collapse

An enterprise administrator configures a Web reputation website in the form of a domain name, and configures the domain name as www. abc; example. com. .

Which of the following is the entry that the firewall will match when looking up the website URL?

Become a Premium Member for full access
  Unlock Premium Member
Total 367 questions
Go to page: of 37
Search

Related questions