ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Huawei NIP6000 products have zero-setting network parameters and plug-and-play functions, because the interfaces and interface pairs only work on layer 2 without Set the IP address.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Nelson Mira
50 questions

Question 12

Report Export Collapse

In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?

Long-term latency and collection of key data.
Long-term latency and collection of key data.
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
Leak the acquired key data information to a third party of interest 155955cc-666171a2-20fac832-0c042c044
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Suggested answer: D
asked 18/09/2024
mahdis khaledi
51 questions

Question 13

Report Export Collapse

Which aspects of information security will be caused by unauthorized access? (multiple choice)

Confidentiality
Confidentiality
Integrity
Integrity
Availability
Availability
Recoverability
Recoverability
Suggested answer: A, B
asked 18/09/2024
David Washington
35 questions

Question 14

Report Export Collapse

Network attacks are mainly divided into two categories: single-packet attacks and streaming attacks.

Single-packet attacks include scanning and snooping attacks, malformed packet attacks, and special reports.

Wen attack.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Manohar M
45 questions

Question 15

Report Export Collapse

Which of the following attacks are attacks against web servers? (multiple choices)

Website phishing deception
Website phishing deception
Website Trojan
Website Trojan
SQL injection
SQL injection
Cross-site scripting attacks 2335
Cross-site scripting attacks 2335
Suggested answer: C, D
asked 18/09/2024
Muneer Deers
49 questions

Question 16

Report Export Collapse

Which of the following is the correct configuration idea for the anti-virus strategy?

Load the feature library
Load the feature library
Configure security policy and reference AV Profile
Configure security policy and reference AV Profile
Apply and activate the license
Apply and activate the license
Configure AV Profile
Configure AV Profile
Submit
Submit
3->1->4->2->5
3->1->4->2->5
3->2->4->1->5
3->2->4->1->5
3->2->1->4->5
3->2->1->4->5
3->1->2->4->5
3->1->2->4->5
Suggested answer: A
asked 18/09/2024
Hector Quintero
50 questions

Question 17

Report Export Collapse

In the security protection system of the cloud era, reforms need to be carried out in the three stages before, during and after the event, and a closed-loop continuous improvement should be formed.

And development. Which of the following key points should be done in "things"? (multiple choice)

Vulnerability intelligence
Vulnerability intelligence
Defense in Depth
Defense in Depth
Offensive and defensive situation
Offensive and defensive situation
Fight back against hackers155955cc-666171a2-20fac832-0c042c045
Fight back against hackers155955cc-666171a2-20fac832-0c042c045
Suggested answer: B, D
asked 18/09/2024
Yusuf Sivrikaya
45 questions

Question 18

Report Export Collapse

Huawei NIP6000 products provide carrier-class high-reliability mechanisms from multiple levels to ensure the stable operation of equipment.

Which of the following options belong to the network reliability? (multiple choice)

Dual machine hot backup
Dual machine hot backup
Power supply. 1+1 redundant backup
Power supply. 1+1 redundant backup
Hardware Bypass
Hardware Bypass
Link-group
Link-group
Suggested answer: A, D
asked 18/09/2024
Narender B
38 questions

Question 19

Report Export Collapse

Which of the following options are common reasons for IPS detection failure? (multiple choices)

IPS policy is not submitted for compilation
IPS policy is not submitted for compilation
False Policy IDs are associated with IPS policy domains
False Policy IDs are associated with IPS policy domains
The IPS function is not turned on
The IPS function is not turned on
Bypass function is closed in IPS
Bypass function is closed in IPS
Suggested answer: A, B, C
asked 18/09/2024
ALLIE SEBRONE MUHAMUBI
46 questions

Question 20

Report Export Collapse

Regarding the file filtering technology in the USG6000 product, which of the following options is wrong?

It can identify the application that carries the file, the file transfer direction, the file type and the file extension.
It can identify the application that carries the file, the file transfer direction, the file type and the file extension.
Even if the file type is modified, it can also identify the true type of the file
Even if the file type is modified, it can also identify the true type of the file
It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.
It can identify the type of files transmitted by itself, and can block, alert and announce specific types of files.
It supports filtering the contents of compressed files after decompression. "
It supports filtering the contents of compressed files after decompression. "
Suggested answer: C
asked 18/09/2024
Minh Phan
33 questions
Total 367 questions
Go to page: of 37
Search

Related questions