ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











In the deployment of Huawei NIP6000 products, only port mirroring can be used for streaming replication.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following is not an abnormal situation of the file type recognition result?

A.
The file extension does not match.
A.
The file extension does not match.
Answers
B.
Unrecognized file type
B.
Unrecognized file type
Answers
C.
File corruption
C.
File corruption
Answers
D.
The file is compressed
D.
The file is compressed
Answers
Suggested answer: D

For SYIN Flood attacks, TCP source authentication and TCP proxy can be used for defense. Which of the following descriptions is correct?

A.
TCP proxy means that the firewall is deployed between the client and the server. When the SYI packet sent by the client to the server passes through the firewall, the The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.
A.
TCP proxy means that the firewall is deployed between the client and the server. When the SYI packet sent by the client to the server passes through the firewall, the The firewall replaces the server and establishes a three-way handshake with the client. Generally used in scenarios where the back and forth paths of packets are inconsistent.
Answers
B.
During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is When the document flow is heavy, the performance requirements of the firewall are often high.
B.
During the TCP proxy process, the firewall will proxy and respond to each SYN message received, and maintain a semi-connection, so when the SYN message is When the document flow is heavy, the performance requirements of the firewall are often high.
Answers
C.
TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233
C.
TCP source authentication has the restriction that the return path must be consistent, so the application of TCP proxy is not common. State "QQ: 9233
Answers
D.
TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.
D.
TCP source authentication is added to the whitelist after the source authentication of the client is passed, and the SYN packet of this source still needs to be verified in the future.
Answers
Suggested answer: B

Which of the following technologies can achieve content security? (multiple choice)

A.
Web security protection
A.
Web security protection
Answers
B.
Global environment awareness
B.
Global environment awareness
Answers
C.
Sandbox and big data analysis
C.
Sandbox and big data analysis
Answers
D.
Intrusion prevention
D.
Intrusion prevention
Answers
Suggested answer: A, B, C, D

Which of the following iterations is correct for the description of the management center?

A.
The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary The stream is reported to the management server for report presentation.
A.
The management server of the management center is responsible for the cleaning of abnormal flow, as well as the collection and analysis of business data, and storage, and is responsible for the summary The stream is reported to the management server for report presentation.
Answers
B.
The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.
B.
The data coking device is responsible for the cleaning of abnormal flow, the centralized management and configuration of equipment, and the presentation of business reports.
Answers
C.
The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.
C.
The data collector and management server support distributed deployment and centralized deployment. Centralized deployment has good scalability.
Answers
D.
The management center is divided into two parts: management server and teaching data collector.
D.
The management center is divided into two parts: management server and teaching data collector.
Answers
Suggested answer: D

The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

If the Huawei USG600 product uses its own protocol stack cache for all files passing through the device and then performs a virus scan, then the device uses It is the stream scanning method.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When the device recognizes a keyword during content filtering detection, which response actions can the device perform? (multiple choice)

A.
Warning
A.
Warning
Answers
B.
Block
B.
Block
Answers
C.
Declare
C.
Declare
Answers
D.
Operate by weight
D.
Operate by weight
Answers
Suggested answer: A, B, D

Which of the following options is wrong for the description of the cleaning center?

A.
The cleaning center completes the functions of drainage, cleaning, and re-injection of the flow after cleaning in the abnormal flow.
A.
The cleaning center completes the functions of drainage, cleaning, and re-injection of the flow after cleaning in the abnormal flow.
Answers
B.
There are two types of drainage methods: static drainage and dynamic drainage.
B.
There are two types of drainage methods: static drainage and dynamic drainage.
Answers
C.
Re-injection methods include: policy route re-injection, static route re-injection, VVPN backinjection and layer 2 same.
C.
Re-injection methods include: policy route re-injection, static route re-injection, VVPN backinjection and layer 2 same.
Answers
D.
The cleaning equipment supports rich and flexible attack prevention technologies, but it is ineffective against cc attacks and ICMP Flood attacks.
D.
The cleaning equipment supports rich and flexible attack prevention technologies, but it is ineffective against cc attacks and ICMP Flood attacks.
Answers
Suggested answer: D

Regarding Huawei's anti-virus technology, which of the following statements is wrong?

A.
The virus detection system cannot directly detect compressed files
A.
The virus detection system cannot directly detect compressed files
Answers
B.
The anti-virus engine can detect the file type through the file extension
B.
The anti-virus engine can detect the file type through the file extension
Answers
C.
Gateway antivirus default file maximum decompression layer is 3 layers
C.
Gateway antivirus default file maximum decompression layer is 3 layers
Answers
D.
The implementation of gateway antivirus is based on proxy scanning and stream scanning
D.
The implementation of gateway antivirus is based on proxy scanning and stream scanning
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37