ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

A.
Local upgrade
A.
Local upgrade
Answers
B.
Manual upgrade
B.
Manual upgrade
Answers
C.
Online upgrade
C.
Online upgrade
Answers
D.
Automatic upgrade
D.
Automatic upgrade
Answers
Suggested answer: A, C

Regarding the global configuration of file filtering configuration files for Huawei USG6000 products, which of the following descriptions is correct?

A.
File filtering, content filtering and anti-virus detection cannot be performed when the file is damaged. At this time, the documents can be released or blocked according to business requirements.
A.
File filtering, content filtering and anti-virus detection cannot be performed when the file is damaged. At this time, the documents can be released or blocked according to business requirements.
Answers
B.
When the file extension does not match, if the action is "Allow" or "Alarm", file filtering, content filtering and anti-virus are performed according to the file type Detection.
B.
When the file extension does not match, if the action is "Allow" or "Alarm", file filtering, content filtering and anti-virus are performed according to the file type Detection.
Answers
C.
When the number of compression layers of a file is greater than the configured "Maximum Decompression Layers", the firewall cannot filter the file.
C.
When the number of compression layers of a file is greater than the configured "Maximum Decompression Layers", the firewall cannot filter the file.
Answers
D.
When the file type cannot be recognized, file filtering, content filtering and anti-virus detection are not performed.
D.
When the file type cannot be recognized, file filtering, content filtering and anti-virus detection are not performed.
Answers
Suggested answer: C

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed In the high-performance engine. Which of the following is not the content security detection function supported by this product?

A.
Application recognition and perception
A.
Application recognition and perception
Answers
B.
URL classification and filtering
B.
URL classification and filtering
Answers
C.
Video content filtering
C.
Video content filtering
Answers
D.
Intrusion prevention 155955cc-666171a2-20fac832-0c042c048
D.
Intrusion prevention 155955cc-666171a2-20fac832-0c042c048
Answers
Suggested answer: C

Which of the following options does not belong to the basic DDoS attack prevention configuration process?

A.
The system starts traffic statistics.
A.
The system starts traffic statistics.
Answers
B.
System related configuration application, fingerprint learning.
B.
System related configuration application, fingerprint learning.
Answers
C.
The system starts attack prevention.
C.
The system starts attack prevention.
Answers
D.
The system performs preventive actions.
D.
The system performs preventive actions.
Answers
Suggested answer: B

Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?

A.
It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects
A.
It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects
Answers
B.
Use the newly received network packet as the data source;
B.
Use the newly received network packet as the data source;
Answers
C.
Real-time monitoring through the network adapter, and analysis of all communication services through the network;
C.
Real-time monitoring through the network adapter, and analysis of all communication services through the network;
Answers
D.
Used to monitor network traffic, and can be deployed independently.
D.
Used to monitor network traffic, and can be deployed independently.
Answers
Suggested answer: B

Cloud sandbox refers to deploying the sandbox in the cloud and providing remote detection services for tenants. The process includes:

A.
Report suspicious files
A.
Report suspicious files
Answers
B.
Retrospective attack
B.
Retrospective attack
Answers
C.
Firewall linkage defense
C.
Firewall linkage defense
Answers
D.
Prosecution in the cloud sandboxFor the ordering of the process, which of the following options is correct?
D.
Prosecution in the cloud sandboxFor the ordering of the process, which of the following options is correct?
Answers
E.
1-3-4-2
E.
1-3-4-2
Answers
F.
1-4-2-3
F.
1-4-2-3
Answers
G.
1-4-3-2
G.
1-4-3-2
Answers
H.
3-1-4-2:
H.
3-1-4-2:
Answers
Suggested answer: C

What content can be filtered by the content filtering technology of Huawei USG6000 products?

(multiple choice)

A.
Keywords contained in the content of the uploaded file
A.
Keywords contained in the content of the uploaded file
Answers
B.
Keywords contained in the downloaded file
B.
Keywords contained in the downloaded file
Answers
C.
File type
C.
File type
Answers
D.
File upload direction 335
D.
File upload direction 335
Answers
Suggested answer: A, B

Regarding the sequence of file filtering technology processing flow, which of the following is correct?

(1) The security policy is applied as permit

(2) Protocol decoding

(3) File type recognition

(4) Application recognition

(5) File filtering

A.
(1)(2)(3)(4)(5)155955cc-666171a2-20fac832-0c042c049
A.
(1)(2)(3)(4)(5)155955cc-666171a2-20fac832-0c042c049
Answers
B.
(1)(4)(2)(3)(5)
B.
(1)(4)(2)(3)(5)
Answers
C.
(1)(2)(4)(3)(5)
C.
(1)(2)(4)(3)(5)
Answers
D.
(1)(3)(2)(4)(5)
D.
(1)(3)(2)(4)(5)
Answers
Suggested answer: B

Which of the following statements about IPS is wrong?

A.
The priority of the coverage signature is higher than that of the signature in the signature set.
A.
The priority of the coverage signature is higher than that of the signature in the signature set.
Answers
B.
When the "source security zone" is the same as the "destination security zone", it means that the IPS policy is applied in the domain.
B.
When the "source security zone" is the same as the "destination security zone", it means that the IPS policy is applied in the domain.
Answers
C.
Modifications to the PS policy will not take effect immediately. You need to submit a compilation to update the configuration of the IPS policy.
C.
Modifications to the PS policy will not take effect immediately. You need to submit a compilation to update the configuration of the IPS policy.
Answers
D.
The signature set can contain either predefined signatures or custom signatures. 832335
D.
The signature set can contain either predefined signatures or custom signatures. 832335
Answers
Suggested answer: D

Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main Which four major components are included?

A.
Event extraction, intrusion analysis, reverse intrusion and remote management.
A.
Event extraction, intrusion analysis, reverse intrusion and remote management.
Answers
B.
Incident extraction, intrusion analysis, intrusion response and on-site management.
B.
Incident extraction, intrusion analysis, intrusion response and on-site management.
Answers
C.
Incident recording, intrusion analysis, intrusion response and remote management.
C.
Incident recording, intrusion analysis, intrusion response and remote management.
Answers
D.
Incident extraction, intrusion analysis, intrusion response and remote management.
D.
Incident extraction, intrusion analysis, intrusion response and remote management.
Answers
Suggested answer: D
Total 367 questions
Go to page: of 37