ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

What content can be filtered by the content filtering technology of Huawei USG6000 products?

A.
File content filtering
A.
File content filtering
Answers
B.
Voice content filtering
B.
Voice content filtering
Answers
C.
Apply content filtering..
C.
Apply content filtering..
Answers
D.
The source of the video content
D.
The source of the video content
Answers
Suggested answer: A, C

If you combine security defense with big data technology, which of the following statements are correct? (multiple choice)

A.
In the learning process, you should start from collecting samples, analyze their characteristics and then perform machine learning.
A.
In the learning process, you should start from collecting samples, analyze their characteristics and then perform machine learning.
Answers
B.
Machine learning only counts a large number of samples, which is convenient for security administrators to view.
B.
Machine learning only counts a large number of samples, which is convenient for security administrators to view.
Answers
C.
In the detection process, the characteristics of unknown samples need to be extracted and calculated to provide samples for subsequent static comparisons.
C.
In the detection process, the characteristics of unknown samples need to be extracted and calculated to provide samples for subsequent static comparisons.
Answers
D.
Security source data can come from many places, including data streams, messages, threat events, logs, etc.
D.
Security source data can come from many places, including data streams, messages, threat events, logs, etc.
Answers
Suggested answer: A, C, D

Use BGP protocol to achieve diversion, the configuration command is as follows [sysname] route-policy 1 permit node 1 [sysname-route-policy] apply community no-advertise [sysname-route-policy] quit [sysname]bgp100 155955cc-666171a2-20fac832-0c042c04 29 [sysname-bgp] peer [sysname-bgp] import-route unr [sysname- bgpl ipv4-family unicast [sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export [sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community [sysname-bgp-af-ipv4] quit [sysname-bgp]quit Which of the following options is correct for the description of BGP diversion configuration?

(multiple choice)

A.
Use BGP to publish UNR routes to achieve dynamic diversion.
A.
Use BGP to publish UNR routes to achieve dynamic diversion.
Answers
B.
After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.
B.
After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.
Answers
C.
You also need to configure the firewall ddos bgp-next-hop fib-filter command to implement backinjection.
C.
You also need to configure the firewall ddos bgp-next-hop fib-filter command to implement backinjection.
Answers
D.
The management center does not need to configure protection objects. When an attack is discovered, it automatically issues a traffic diversion task.
D.
The management center does not need to configure protection objects. When an attack is discovered, it automatically issues a traffic diversion task.
Answers
Suggested answer: A, B

Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?

A.
Virus
A.
Virus
Answers
B.
Buffer overflow ?
B.
Buffer overflow ?
Answers
C.
System vulnerabilities
C.
System vulnerabilities
Answers
D.
Port scan
D.
Port scan
Answers
Suggested answer: D

Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system. Which of the following What is the content of the intrusion detection knowledge base?

A.
Complete virus sample
A.
Complete virus sample
Answers
B.
Complete Trojan Horse
B.
Complete Trojan Horse
Answers
C.
Specific behavior patterns
C.
Specific behavior patterns
Answers
D.
Security Policy
D.
Security Policy
Answers
Suggested answer: C

The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files. Which of the following is not allowed Can the reason?

A.
The file filtering configuration file is not referenced in the security policy
A.
The file filtering configuration file is not referenced in the security policy
Answers
B.
File filtering configuration file is incorrect
B.
File filtering configuration file is incorrect
Answers
C.
License is not activated.
C.
License is not activated.
Answers
D.
The action configuration of the file extension does not match is incorrect
D.
The action configuration of the file extension does not match is incorrect
Answers
Suggested answer: D

Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?

A.
Ordinary attacks will usually be cleaned locally first.
A.
Ordinary attacks will usually be cleaned locally first.
Answers
B.
If there is a large traffic attack on the network, send it to the cloud cleaning center to share the cleaning pressure.
B.
If there is a large traffic attack on the network, send it to the cloud cleaning center to share the cleaning pressure.
Answers
C.
Since the Cloud Cleaning Alliance will direct larger attack flows to the cloud for cleaning, it will cause network congestion.
C.
Since the Cloud Cleaning Alliance will direct larger attack flows to the cloud for cleaning, it will cause network congestion.
Answers
D.
The closer to the attacked self-labeled cloud cleaning service, the priority will be called.155955cc-666171a2-20fac832-0c042c0430
D.
The closer to the attacked self-labeled cloud cleaning service, the priority will be called.155955cc-666171a2-20fac832-0c042c0430
Answers
Suggested answer: C

The processing flow of IPS has the following steps;

A.
Reorganize application data
A.
Reorganize application data
Answers
B.
Match the signature
B.
Match the signature
Answers
C.
Message processing
C.
Message processing
Answers
D.
Protocol identificationWhich of the following is the correct order of the processing flow?
D.
Protocol identificationWhich of the following is the correct order of the processing flow?
Answers
E.
4-1-2-3
E.
4-1-2-3
Answers
F.
1-4-2-3
F.
1-4-2-3
Answers
G.
1-3-2-4
G.
1-3-2-4
Answers
H.
2-4-1-3:
H.
2-4-1-3:
Answers
Suggested answer: B

An enterprise administrator configures the Web reputation system as shown in the figure. Regarding the configuration, which of the following statements is correct?

A.
The content in No. 2 must be configured.
A.
The content in No. 2 must be configured.
Answers
B.
In addition to this page configuration, you also need to enable the firewall and sandbox linkage, otherwise the page configuration is invalid
B.
In addition to this page configuration, you also need to enable the firewall and sandbox linkage, otherwise the page configuration is invalid
Answers
C.
The content in No. 4 must be configured.
C.
The content in No. 4 must be configured.
Answers
D.
After the configuration is completed, you need to submit the configuration to take effect.
D.
After the configuration is completed, you need to submit the configuration to take effect.
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37