ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

A.
Planting malware
A.
Planting malware
Answers
B.
Vulnerability attack"
B.
Vulnerability attack"
Answers
C.
We6 Application Click
C.
We6 Application Click
Answers
D.
Brute force
D.
Brute force
Answers
Suggested answer: A

Regarding intrusion detection I defense equipment, which of the following statements are correct?

(multiple choice)

A.
It cannot effectively prevent the virus from spreading from the Internet to the intranet.
A.
It cannot effectively prevent the virus from spreading from the Internet to the intranet.
Answers
B.
The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services Experience.
B.
The number of applications that NIP6000 can recognize reaches 6000+, which realizes refined application protection, saves export bandwidth, and guarantees key business services Experience.
Answers
C.
Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.
C.
Protect the intranet from external attacks, and inhibit malicious flows, such as spyware, worms, etc. from flooding and spreading to the intranet.
Answers
D.
Ability to quickly adapt to threat changes
D.
Ability to quickly adapt to threat changes
Answers
Suggested answer: B, C, D

Threats detected by the big data intelligent security analysis platform will be synchronized to each network device at the same time C and then collected from the network device Collect it in the log for continuous learning and optimization.

A.
True155955cc-666171a2-20fac832-0c042c0433
A.
True155955cc-666171a2-20fac832-0c042c0433
Answers
B.
False
B.
False
Answers
Suggested answer: A

The analysis and processing capabilities of traditional firewalls at the application layer are weak, and they cannot correctly analyze malicious codes that are mixed in the flow of allowed application teaching: many Attacks or malicious behaviors often use the firewall's open application data flow to cause damage, causing application layer threats to penetrate the firewall

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options are the possible reasons why a certain signature is not included after the IPS policy configuration is completed? (multiple choice)

A.
Direction is not enabled
A.
Direction is not enabled
Answers
B.
The direction is turned on, but no specific direction is selected
B.
The direction is turned on, but no specific direction is selected
Answers
C.
The severity level of the configuration is too high
C.
The severity level of the configuration is too high
Answers
D.
The protocol selection technique is correct
D.
The protocol selection technique is correct
Answers
Suggested answer: B, C, D

Which of the following descriptions about viruses and Trojans are correct? (multiple choices)

A.
Viruses are triggered by computer users
A.
Viruses are triggered by computer users
Answers
B.
Viruses can replicate themselves
B.
Viruses can replicate themselves
Answers
C.
Trojan horses are triggered by computer users
C.
Trojan horses are triggered by computer users
Answers
D.
Trojans can replicate themselves
D.
Trojans can replicate themselves
Answers
Suggested answer: A, B

After enabling the IP policy, some services are found to be unavailable. Which of the following may be caused by? (multiple choice)

A.
Only packets in one direction pass through the firewall
A.
Only packets in one direction pass through the firewall
Answers
B.
The same message passes through the firewall multiple times
B.
The same message passes through the firewall multiple times
Answers
C.
IPS underreporting
C.
IPS underreporting
Answers
D.
Excessive traffic causes the Bypass function to be enabled
D.
Excessive traffic causes the Bypass function to be enabled
Answers
Suggested answer: A, B

URL filtering technology can perform URL access control on users according to different time objects and address objects to achieve precise management of users.

The purpose of the Internet behavior.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following are the control items of HTTP behavior?) (multiple choice)

A.
POST operation
A.
POST operation
Answers
B.
Browse the web
B.
Browse the web
Answers
C.
Acting online
C.
Acting online
Answers
D.
File upload and download
D.
File upload and download
Answers
Suggested answer: A, B, C, D

Which of the following options is correct for the sequence of the flow-by-stream detection of AntiDDoS?

A.
The Netflow analysis device samples the current network flow;
A.
The Netflow analysis device samples the current network flow;
Answers
B.
Send a drainage command to the cleaning center;
B.
Send a drainage command to the cleaning center;
Answers
C.
Discover the DDoS attack stream;
C.
Discover the DDoS attack stream;
Answers
D.
Netior: analysis equipment sends alarms to ATIC management center
D.
Netior: analysis equipment sends alarms to ATIC management center
Answers
E.
The abnormal flow is diverted to the cleaning center for further inspection and cleaning; 6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage 7. The cleaning log is sent to the management center to generate a report; 8. The cleaned traffic is sent to the original destination server.
E.
The abnormal flow is diverted to the cleaning center for further inspection and cleaning; 6. The cleaning center sends the host route of the attacked target IF address server to the router to achieve drainage 7. The cleaning log is sent to the management center to generate a report; 8. The cleaned traffic is sent to the original destination server.
Answers
F.
1-3-4-2-5-6-7-8
F.
1-3-4-2-5-6-7-8
Answers
G.
1-3-2-4-6-5-7-8
G.
1-3-2-4-6-5-7-8
Answers
H.
1-3-4-2-6-5-8-7
H.
1-3-4-2-6-5-8-7
Answers
I.
1-3-24-6-5-8-7
I.
1-3-24-6-5-8-7
Answers
Suggested answer: C
Total 367 questions
Go to page: of 37