ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Based on the anti-virus gateway of streaming scan, which of the following descriptions is wrong?

A.
Rely on state detection technology and protocol analysis technology
A.
Rely on state detection technology and protocol analysis technology
Answers
B.
The performance is higher than the agent-based method
B.
The performance is higher than the agent-based method
Answers
C.
The cost is smaller than the agent-based approach
C.
The cost is smaller than the agent-based approach
Answers
D.
The detection rate is higher than the proxy-based scanning method
D.
The detection rate is higher than the proxy-based scanning method
Answers
Suggested answer: D

Regarding the strong statement of DNS Request Flood attack, which of the following options is correct?

A.
The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source
A.
The DNS Request Flood attack on the cache server can be redirected to verify the legitimacy of the source
Answers
B.
For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify The legitimacy of the source IP.
B.
For the DNS Reguest Flood attack of the authorization server, the client can be triggered to send DINS requests in TCP packets: to verify The legitimacy of the source IP.
Answers
C.
In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process It will consume the TCP connection resources of the OINS cache server.
C.
In the process of source authentication, fire prevention will trigger the client to send DINS request via TCP report to verify the legitimacy of the source IP, but in a certain process It will consume the TCP connection resources of the OINS cache server.
Answers
D.
Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.
D.
Redirection should not be implemented on the source IP address of the attacked domain name, and the destination P address of the attacked domain name should be implemented in the wild.
Answers
Suggested answer: C

Regarding the anti-spam response code, which of the following statements is wrong?

A.
The response code will vary depending on the RBL service provider.155955cc-666171a2-20fac832-0c042c046
A.
The response code will vary depending on the RBL service provider.155955cc-666171a2-20fac832-0c042c046
Answers
B.
USG treats mails that match the answer code as spam.
B.
USG treats mails that match the answer code as spam.
Answers
C.
If the response code is not returned or the response code is not configured on the USG, the mail is released.
C.
If the response code is not returned or the response code is not configured on the USG, the mail is released.
Answers
D.
The response code is specified as 127.0.0.1 in the second system.
D.
The response code is specified as 127.0.0.1 in the second system.
Answers
Suggested answer: D

The configuration command to enable the attack prevention function is as follows; n [FW] anti-ddos syn-flood source-detect [FW] anti-ddos udp-flood dynamic-fingerprint-learn [FW] anti-ddos udp-frag-flood dynamic fingerprint-learn [FW] anti-ddos http-flood defend alert-rate 2000 [Fwj anti-ddos htp-flood source-detect mode basic Which of the following options is correct for the description of the attack prevention configuration?

(multiple choice)

A.
The firewall has enabled the SYN Flood source detection and defense function
A.
The firewall has enabled the SYN Flood source detection and defense function
Answers
B.
The firewall uses the first packet drop to defend against UDP Flood attacks.
B.
The firewall uses the first packet drop to defend against UDP Flood attacks.
Answers
C.
HTTP Flood attack defense uses enhanced mode for defense
C.
HTTP Flood attack defense uses enhanced mode for defense
Answers
D.
The threshold for HTTP Flood defense activation is 2000.
D.
The threshold for HTTP Flood defense activation is 2000.
Answers
Suggested answer: A, D

The application behavior control configuration file takes effect immediately after being referenced, without configuration submission.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Regarding the description of keywords, which of the following is correct? (multiple choice)

A.
Keywords are the content that the device needs to recognize during content filtering.
A.
Keywords are the content that the device needs to recognize during content filtering.
Answers
B.
Keywords include predefined keywords and custom keywords.
B.
Keywords include predefined keywords and custom keywords.
Answers
C.
The minimum length of the keyword that the text can match is 2 bytes. ,
C.
The minimum length of the keyword that the text can match is 2 bytes. ,
Answers
D.
Custom keywords can only be defined in text mode.
D.
Custom keywords can only be defined in text mode.
Answers
Suggested answer: A, B

IPS is an intelligent intrusion detection and defense product. It can not only detect the occurrence of intrusions, but also can respond in real time through certain response methods.

Stop the occurrence and development of intrusions, and protect the information system from substantial attacks in real time. According to the description of PS, the following items are wrong?

A.
IPS is an intrusion detection system that can block real-time intrusions when found
A.
IPS is an intrusion detection system that can block real-time intrusions when found
Answers
B.
IPS unifies IDS and firewall
B.
IPS unifies IDS and firewall
Answers
C.
IPS must use bypass deployment in the network
C.
IPS must use bypass deployment in the network
Answers
D.
Common IPS deployment modes are in-line deployment,
D.
Common IPS deployment modes are in-line deployment,
Answers
Suggested answer: C

The following commands are configured on the Huawei firewall:

[USG] firewall defend ip-fragment enable

Which of the following situations will be recorded as an offensive behavior? (multiple choice)

A.
DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0, 155955cc-666171a2-20fac832-0c042c047
A.
DF, bit is down, and MF bit is also 1 or Fragment Offset is not 0, 155955cc-666171a2-20fac832-0c042c047
Answers
B.
DF bit is 023, MF bit is 1 or Fragment Offset is not 0,
B.
DF bit is 023, MF bit is 1 or Fragment Offset is not 0,
Answers
C.
DF bit is 0, and Fragment Offset + Length> 65535.
C.
DF bit is 0, and Fragment Offset + Length> 65535.
Answers
D.
The DF bit is 1, and Fragment Ofset + Length <65535.
D.
The DF bit is 1, and Fragment Ofset + Length <65535.
Answers
Suggested answer: A, C

Huawei's USG000 product can identify the true type of common files and over-check the content.

Even if the file is hidden in a compressed file, or change the extension The name of the exhibition can't escape the fiery eyes of the firewall.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

For the description of the Anti DDOS system, which of the following options is correct? C

A.
The detection center is mainly to pull and clean the attack flow according to the control strategy of the security management center, and re-inject the cleaned normal flow back to the customer.User network, send to the real destination.
A.
The detection center is mainly to pull and clean the attack flow according to the control strategy of the security management center, and re-inject the cleaned normal flow back to the customer.User network, send to the real destination.
Answers
B.
The management center mainly completes the processing of attack events, controls the drainage strategy and cleaning strategy of the cleaning center, and responds to various attack events and attack flows.View in categories and generate reports.
B.
The management center mainly completes the processing of attack events, controls the drainage strategy and cleaning strategy of the cleaning center, and responds to various attack events and attack flows.View in categories and generate reports.
Answers
C.
The main function of the Green Washing Center is to detect and analyze DDoS attack traffic on the flow from mirroring or splitting, and provide analysis data to The management center makes a judgment.
C.
The main function of the Green Washing Center is to detect and analyze DDoS attack traffic on the flow from mirroring or splitting, and provide analysis data to The management center makes a judgment.
Answers
D.
The firewall can only be used for inspection equipment
D.
The firewall can only be used for inspection equipment
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37