ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











File filtering technology can filter files based on the application of the file, the file transfer direction, the file type and the file extension.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The anti-virus feature configured on the Huawei USG6000 product does not take effect. Which of the following are the possible reasons? (multiple choice)

A.
The security policy does not reference the anti-virus configuration file.
A.
The security policy does not reference the anti-virus configuration file.
Answers
B.
The anti-virus configuration file is configured incorrectly.
B.
The anti-virus configuration file is configured incorrectly.
Answers
C.
The virus signature database version is older.
C.
The virus signature database version is older.
Answers
D.
No virus exceptions are configured.
D.
No virus exceptions are configured.
Answers
Suggested answer: A, B, C

After the user deploys the firewall anti-virus strategy, there is no need to deploy anti-virus software

A.
True
A.
True
Answers
B.
False.
B.
False.
Answers
Suggested answer: B

Which of the following descriptions are correct for proxy-based anti-virus gateways? (multiple choice)

A.
The detection rate is higher than the flow scanning method
A.
The detection rate is higher than the flow scanning method
Answers
B.
System overhead will be relatively small
B.
System overhead will be relatively small
Answers
C.
Cache all files through the gateway's own protocol stack
C.
Cache all files through the gateway's own protocol stack
Answers
D.
More advanced operations such as decompression, shelling, etc. can be performed
D.
More advanced operations such as decompression, shelling, etc. can be performed
Answers
Suggested answer: A, C, D

When the license of Huawei USG6000 product expires, the RBL function will be unavailable, and users can only use the local black and white list to filter junk mail.

155955cc-666171a2-20fac832-0c042c0435

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

For the description of the principles of HTTP Flood and HTTPS Flood blow defense, which of thefollowing options are correct? (multiple choice)

A.
HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.
A.
HTTPS Flood defense modes include basic mode, enhanced mode and 302 redirection.
Answers
B.
HTTPS Flood defense can perform source authentication by limiting the request rate of packets.
B.
HTTPS Flood defense can perform source authentication by limiting the request rate of packets.
Answers
C.
The principle of HTTPS Flood attack is to request URIs involving database operations or other URIsthat consume system resources, causing server resource consumption.Failed to respond to normal requests.
C.
The principle of HTTPS Flood attack is to request URIs involving database operations or other URIsthat consume system resources, causing server resource consumption.Failed to respond to normal requests.
Answers
D.
The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to thetarget server, causing the server resources to be exhausted and unable to respond to regularrequests.begging.
D.
The principle of HTTPS Flood attack is to initiate a large number of HTTPS connections to thetarget server, causing the server resources to be exhausted and unable to respond to regularrequests.begging.
Answers
Suggested answer: B, C, D

Under the CLI command, which of the following commands can be used to view the AV engine and virus database version?

A.
display version av-sdb
A.
display version av-sdb
Answers
B.
display utm av version
B.
display utm av version
Answers
C.
display av utm version
C.
display av utm version
Answers
D.
display utm version
D.
display utm version
Answers
Suggested answer: A

Which of the following statement is correct about Policy Center system client function?

A.
NAC Agent support MAC account login.
A.
NAC Agent support MAC account login.
Answers
B.
Web page login for authentication and can perform checks Strategy.
B.
Web page login for authentication and can perform checks Strategy.
Answers
C.
Web Agent login for identity certification and security certification.
C.
Web Agent login for identity certification and security certification.
Answers
D.
NAC Agent cannot be installed on Windows Vista operating system.
D.
NAC Agent cannot be installed on Windows Vista operating system.
Answers
Suggested answer: A

Which of the following elements does PDCA include? (Choose 3 answers)

A.
Plan
A.
Plan
Answers
B.
Implementation
B.
Implementation
Answers
C.
termination
C.
termination
Answers
D.
Monitoring
D.
Monitoring
Answers
Suggested answer: A, B, D

Place refers to the terminal environment when end-user use strategy management center access to controlled network office, which options are correct about place? (Choose 2 answers)

A.
strategy management center only support the default place
A.
strategy management center only support the default place
Answers
B.
The default place only support by way of cable access network scenario
B.
The default place only support by way of cable access network scenario
Answers
C.
can be customized places
C.
can be customized places
Answers
D.
when allocation strategy template for the end user, need to select the corresponding places
D.
when allocation strategy template for the end user, need to select the corresponding places
Answers
Suggested answer: C, D
Total 367 questions
Go to page: of 37