ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











Huawei NIP6000 products have zero-setting network parameters and plug-and-play functions, because the interfaces and interface pairs only work on layer 2 without Set the IP address.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

A.
Long-term latency and collection of key data.
A.
Long-term latency and collection of key data.
Answers
B.
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
B.
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
Answers
C.
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
C.
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
Answers
D.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
D.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Answers
Suggested answer: D

Which aspects of information security will be caused by unauthorized access? (multiple choice)

A.
Confidentiality
A.
Confidentiality
Answers
B.
Integrity
B.
Integrity
Answers
C.
Availability
C.
Availability
Answers
D.
Recoverability
D.
Recoverability
Answers
Suggested answer: A, B

Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks.

Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.

Wen attack.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following attacks are attacks against web servers? (multiple choices)

A.
Website phishing deception
A.
Website phishing deception
Answers
B.
Website Trojan
B.
Website Trojan
Answers
C.
SQL injection
C.
SQL injection
Answers
D.
Cross-site scripting attacks 2335
D.
Cross-site scripting attacks 2335
Answers
Suggested answer: C, D

Which of the following is the correct configuration idea for the anti-virus strategy?

A.
Load the feature library
A.
Load the feature library
Answers
B.
Configure security policy and reference AV Profile
B.
Configure security policy and reference AV Profile
Answers
C.
Apply and activate the license
C.
Apply and activate the license
Answers
D.
Configure AV Profile
D.
Configure AV Profile
Answers
E.
Submit
E.
Submit
Answers
F.
3->1->4->2->5
F.
3->1->4->2->5
Answers
G.
3->2->4->1->5
G.
3->2->4->1->5
Answers
H.
3->2->1->4->5
H.
3->2->1->4->5
Answers
I.
3->1->2->4->5
I.
3->1->2->4->5
Answers
Suggested answer: A

In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.

And development. Which of the following key points should be done in "things"? (multiple choice)

A.
Vulnerability intelligence
A.
Vulnerability intelligence
Answers
B.
Defense in Depth
B.
Defense in Depth
Answers
C.
Offensive and defensive situation
C.
Offensive and defensive situation
Answers
D.
Fight back against hackers155955cc-666171a2-20fac832-0c042c045
D.
Fight back against hackers155955cc-666171a2-20fac832-0c042c045
Answers
Suggested answer: B, D

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

A.
Dual machine hot backup
A.
Dual machine hot backup
Answers
B.
Power supply. 1+1 redundant backup
B.
Power supply. 1+1 redundant backup
Answers
C.
Hardware Bypass
C.
Hardware Bypass
Answers
D.
Link-group
D.
Link-group
Answers
Suggested answer: A, D

Which of the following options are common reasons for IPS detection failure? (multiple choices)

A.
IPS policy is not submitted for compilation
A.
IPS policy is not submitted for compilation
Answers
B.
False Policy IDs are associated with IPS policy domains
B.
False Policy IDs are associated with IPS policy domains
Answers
C.
The IPS function is not turned on
C.
The IPS function is not turned on
Answers
D.
Bypass function is closed in IPS
D.
Bypass function is closed in IPS
Answers
Suggested answer: A, B, C

Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?

A.
It can identify the application that carries the file, the file transfer direction, the file type and the file extension.
A.
It can identify the application that carries the file, the file transfer direction, the file type and the file extension.
Answers
B.
Even if the file type is modified, it can also identify the true type of the file
B.
Even if the file type is modified, it can also identify the true type of the file
Answers
C.
It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.
C.
It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.
Answers
D.
It supports filtering the contents of compressed files after decompression. "
D.
It supports filtering the contents of compressed files after decompression. "
Answers
Suggested answer: C
Total 367 questions
Go to page: of 37