ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which of the following options belong to the upgrade method of the anti-virus signature database of Huawei USG6000 products? (multiple choice)

Local upgrade
Local upgrade
Manual upgrade
Manual upgrade
Online upgrade
Online upgrade
Automatic upgrade
Automatic upgrade
Suggested answer: A, C
asked 18/09/2024
Tuukka Valkeasuo
48 questions

Question 32

Report Export Collapse

Regarding the global configuration of file filtering configuration files for Huawei USG6000 products, which of the following descriptions is correct?

File filtering, content filtering and anti-virus detection cannot be performed when the file is damaged. At this time, the documents can be released or blocked according to business requirements.
File filtering, content filtering and anti-virus detection cannot be performed when the file is damaged. At this time, the documents can be released or blocked according to business requirements.
When the file extension does not match, if the action is "Allow" or "Alarm", file filtering, content filtering and anti-virus are performed according to the file type Detection.
When the file extension does not match, if the action is "Allow" or "Alarm", file filtering, content filtering and anti-virus are performed according to the file type Detection.
When the number of compression layers of a file is greater than the configured "Maximum Decompression Layers", the firewall cannot filter the file.
When the number of compression layers of a file is greater than the configured "Maximum Decompression Layers", the firewall cannot filter the file.
When the file type cannot be recognized, file filtering, content filtering and anti-virus detection are not performed.
When the file type cannot be recognized, file filtering, content filtering and anti-virus detection are not performed.
Suggested answer: C
asked 18/09/2024
claudine Nguepnang
46 questions

Question 33

Report Export Collapse

In Huawei USG6000 products, IAE provides an integrated solution, all content security detection functions are integrated in a well-designed In the high-performance engine. Which of the following is not the content security detection function supported by this product?

Application recognition and perception
Application recognition and perception
URL classification and filtering
URL classification and filtering
Video content filtering
Video content filtering
Intrusion prevention 155955cc-666171a2-20fac832-0c042c048
Intrusion prevention 155955cc-666171a2-20fac832-0c042c048
Suggested answer: C
asked 18/09/2024
Manohar M
45 questions

Question 34

Report Export Collapse

Which of the following options does not belong to the basic DDoS attack prevention configuration process?

The system starts traffic statistics.
The system starts traffic statistics.
System related configuration application, fingerprint learning.
System related configuration application, fingerprint learning.
The system starts attack prevention.
The system starts attack prevention.
The system performs preventive actions.
The system performs preventive actions.
Suggested answer: B
asked 18/09/2024
Levente Mikofalvi
34 questions

Question 35

Report Export Collapse

Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?

It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects
It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects
Use the newly received network packet as the data source;
Use the newly received network packet as the data source;
Real-time monitoring through the network adapter, and analysis of all communication services through the network;
Real-time monitoring through the network adapter, and analysis of all communication services through the network;
Used to monitor network traffic, and can be deployed independently.
Used to monitor network traffic, and can be deployed independently.
Suggested answer: B
asked 18/09/2024
Bruce Baynes
31 questions

Question 36

Report Export Collapse

Cloud sandbox refers to deploying the sandbox in the cloud and providing remote detection services for tenants. The process includes:

Report suspicious files
Report suspicious files
Retrospective attack
Retrospective attack
Firewall linkage defense
Firewall linkage defense
Prosecution in the cloud sandboxFor the ordering of the process, which of the following options is correct?
Prosecution in the cloud sandboxFor the ordering of the process, which of the following options is correct?
1-3-4-2
1-3-4-2
1-4-2-3
1-4-2-3
1-4-3-2
1-4-3-2
3-1-4-2:
3-1-4-2:
Suggested answer: C
asked 18/09/2024
Arnaud DUTEL
36 questions

Question 37

Report Export Collapse

What content can be filtered by the content filtering technology of Huawei USG6000 products?

(multiple choice)

Keywords contained in the content of the uploaded file
Keywords contained in the content of the uploaded file
Keywords contained in the downloaded file
Keywords contained in the downloaded file
File type
File type
File upload direction 335
File upload direction 335
Suggested answer: A, B
asked 18/09/2024
Ahsan Ilyas
36 questions

Question 38

Report Export Collapse

Regarding the sequence of file filtering technology processing flow, which of the following is correct?

(1) The security policy is applied as permit

(2) Protocol decoding

(3) File type recognition

(4) Application recognition

(5) File filtering

(1)(2)(3)(4)(5)155955cc-666171a2-20fac832-0c042c049
(1)(2)(3)(4)(5)155955cc-666171a2-20fac832-0c042c049
(1)(4)(2)(3)(5)
(1)(4)(2)(3)(5)
(1)(2)(4)(3)(5)
(1)(2)(4)(3)(5)
(1)(3)(2)(4)(5)
(1)(3)(2)(4)(5)
Suggested answer: B
asked 18/09/2024
Anand Prakash
40 questions

Question 39

Report Export Collapse

Which of the following statements about IPS is wrong?

The priority of the coverage signature is higher than that of the signature in the signature set.
The priority of the coverage signature is higher than that of the signature in the signature set.
When the "source security zone" is the same as the "destination security zone", it means that the IPS policy is applied in the domain.
When the "source security zone" is the same as the "destination security zone", it means that the IPS policy is applied in the domain.
Modifications to the PS policy will not take effect immediately. You need to submit a compilation to update the configuration of the IPS policy.
Modifications to the PS policy will not take effect immediately. You need to submit a compilation to update the configuration of the IPS policy.
The signature set can contain either predefined signatures or custom signatures. 832335
The signature set can contain either predefined signatures or custom signatures. 832335
Suggested answer: D
asked 18/09/2024
sergio sombrero
39 questions

Question 40

Report Export Collapse

Due to differences in network environment and system security strategies, intrusion detection systems are also different in specific implementation. From the perspective of system composition, the main Which four major components are included?

Event extraction, intrusion analysis, reverse intrusion and remote management.
Event extraction, intrusion analysis, reverse intrusion and remote management.
Incident extraction, intrusion analysis, intrusion response and on-site management.
Incident extraction, intrusion analysis, intrusion response and on-site management.
Incident recording, intrusion analysis, intrusion response and remote management.
Incident recording, intrusion analysis, intrusion response and remote management.
Incident extraction, intrusion analysis, intrusion response and remote management.
Incident extraction, intrusion analysis, intrusion response and remote management.
Suggested answer: D
asked 18/09/2024
Anirban Ganguly
57 questions
Total 367 questions
Go to page: of 37
Search

Related questions