ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

For the description of URPF technology, which of the following options are correct? (multiple choice)

The main function is to prevent network attacks based on source address spoofing.
The main function is to prevent network attacks based on source address spoofing.
In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.
In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.
The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.
The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.
Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.
Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.
Suggested answer: A, D
asked 18/09/2024
WONG CHUN KIT WONG CHUN KIT
30 questions

Question 42

Report Export Collapse

Which of the following descriptions about the black and white lists in spam filtering is wrong? c

Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.
Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.
In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address Address one line. v
In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address Address one line. v
Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP Address one line.
Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP Address one line.
The priority of the blacklist is higher than that of the whitelist.
The priority of the blacklist is higher than that of the whitelist.
Suggested answer: D
asked 18/09/2024
107 gleann na ri charles
37 questions

Question 43

Report Export Collapse

Which of the following options belong to the network layer attack of the TCP/IP protocol stack?

(multiple choice)

Address scanning
Address scanning
Buffer overflow p
Buffer overflow p
Port scan
Port scan
IP spoofing
IP spoofing
Suggested answer: A, D
asked 18/09/2024
CATALIN FLORESCU
39 questions

Question 44

Report Export Collapse

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom&age=20, which option is path?

htttp://www.abcd. com:8080/news/education. aspx
htttp://www.abcd. com:8080/news/education. aspx
htttp://www.abcd. com:8080,te
htttp://www.abcd. com:8080,te
/news/education. aspx
/news/education. aspx
/news/education. aspx?name=tom&age=20
/news/education. aspx?name=tom&age=20
Suggested answer: C
asked 18/09/2024
Matthew McConnell
48 questions

Question 45

Report Export Collapse

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

Huawei H12-724 image Question 45 32977 09182024192736000000

3-4
3-4
1-3-4
1-3-4
5-6
5-6
2-4
2-4
Suggested answer: A
asked 18/09/2024
fadi kako
50 questions

Question 46

Report Export Collapse

SQl injection attacks generally have the following steps:

Elevate the right

Get the data in the database

Determine whether there are loopholes in the webpage

Determine the database type

For the ordering of these steps, which of the following options is correct?

3412
3412
3421
3421
4123
4123
4213
4213
Suggested answer: B
asked 18/09/2024
Arpita Pattnayak
56 questions

Question 47

Report Export Collapse

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.
The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.
It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa
It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa
Port mirroring needs to be configured on the management center to monitor abnormal traffic.155955cc-666171a2-20fac832-0c042c0411
Port mirroring needs to be configured on the management center to monitor abnormal traffic.155955cc-666171a2-20fac832-0c042c0411
The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:
The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:
Suggested answer: A, B
asked 18/09/2024
Angel Molina
47 questions

Question 48

Report Export Collapse

USG6000V software logic architecture is divided into three planes: management plane, control plane and

Configuration plane
Configuration plane
Business plane
Business plane
Log plane
Log plane
Data forwarding plane
Data forwarding plane
Suggested answer: D
asked 18/09/2024
Arkadiusz Skopinski
47 questions

Question 49

Report Export Collapse

The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide Analyze the suspicious object, which of the following options are its main features? (multiple choices)

Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so Not vulnerable to attack.
Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so Not vulnerable to attack.
The monitoring speed is fast (the problem can be found in microseconds or seconds, and the hostbased DS needs to take an analysis of the audit transcripts in the last few minutes
The monitoring speed is fast (the problem can be found in microseconds or seconds, and the hostbased DS needs to take an analysis of the audit transcripts in the last few minutes
Need a lot of monitors.
Need a lot of monitors.
It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.
It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.
Suggested answer: A, B
asked 18/09/2024
Kishi Peart
43 questions

Question 50

Report Export Collapse

Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?

POP3
POP3
IMAP
IMAP
FTP
FTP
TFTP
TFTP
Suggested answer: D
asked 18/09/2024
Florence Li
46 questions
Total 367 questions
Go to page: of 37
Search

Related questions