ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











For the description of URPF technology, which of the following options are correct? (multiple choice)

A.
The main function is to prevent network attacks based on source address spoofing.
A.
The main function is to prevent network attacks based on source address spoofing.
Answers
B.
In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.
B.
In strict mode, it does not check whether the interface matches. As long as there is a route to the source address, the message can pass.
Answers
C.
The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.
C.
The loose mode not only requires corresponding entries in the forwarding table, but also requires that the interface must match to pass the URPF check.
Answers
D.
Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.
D.
Use URPF's loose mode in an environment where routing symmetry cannot be guaranteed.
Answers
Suggested answer: A, D

Which of the following descriptions about the black and white lists in spam filtering is wrong? c

A.
Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.
A.
Set local blacklist and whitelist: Both blacklist and whitelist can be configured at the same time, or only one of them can be configured.
Answers
B.
In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address Address one line. v
B.
In the "Whitelist" text box, enter the P address and mask of the SMTP Server to be added to the whitelist. You can enter multiple IP addresses, one IP address Address one line. v
Answers
C.
Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP Address one line.
C.
Enter the IP address and mask of the SMITP Server to be added to the blacklist in the "Blacklist" text box, you can enter multiple IP addresses, one IP Address one line.
Answers
D.
The priority of the blacklist is higher than that of the whitelist.
D.
The priority of the blacklist is higher than that of the whitelist.
Answers
Suggested answer: D

Which of the following options belong to the network layer attack of the TCP/IP protocol stack?

(multiple choice)

A.
Address scanning
A.
Address scanning
Answers
B.
Buffer overflow p
B.
Buffer overflow p
Answers
C.
Port scan
C.
Port scan
Answers
D.
IP spoofing
D.
IP spoofing
Answers
Suggested answer: A, D

For the URL is htpt://www.abcd. com:8080/news/education. aspx?name=tom&age=20, which option is path?

A.
htttp://www.abcd. com:8080/news/education. aspx
A.
htttp://www.abcd. com:8080/news/education. aspx
Answers
B.
htttp://www.abcd. com:8080,te
B.
htttp://www.abcd. com:8080,te
Answers
C.
/news/education. aspx
C.
/news/education. aspx
Answers
D.
/news/education. aspx?name=tom&age=20
D.
/news/education. aspx?name=tom&age=20
Answers
Suggested answer: C

The process of a browser carrying a cookie to request resources from a server is shown in the following figure. Which of the following steps contains SessionID information in the message?

A.
3-4
A.
3-4
Answers
B.
1-3-4
B.
1-3-4
Answers
C.
5-6
C.
5-6
Answers
D.
2-4
D.
2-4
Answers
Suggested answer: A

SQl injection attacks generally have the following steps:

Elevate the right

Get the data in the database

Determine whether there are loopholes in the webpage

Determine the database type

For the ordering of these steps, which of the following options is correct?

A.
3412
A.
3412
Answers
B.
3421
B.
3421
Answers
C.
4123
C.
4123
Answers
D.
4213
D.
4213
Answers
Suggested answer: B

Which of the following options are correct for the configuration description of the management center ATIC? (multiple choice)

A.
The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.
A.
The drainage task needs to be configured on the management center, and when an attack is discovered, it will be issued to the cleaning center.
Answers
B.
It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa
B.
It is necessary to configure the protection object on the management center to guide the abnormal access flow in etpa
Answers
C.
Port mirroring needs to be configured on the management center to monitor abnormal traffic.155955cc-666171a2-20fac832-0c042c0411
C.
Port mirroring needs to be configured on the management center to monitor abnormal traffic.155955cc-666171a2-20fac832-0c042c0411
Answers
D.
The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:
D.
The reinjection strategy needs to be configured on the management center to guide the flow after cleaning. Q:
Answers
Suggested answer: A, B

USG6000V software logic architecture is divided into three planes: management plane, control plane and

A.
Configuration plane
A.
Configuration plane
Answers
B.
Business plane
B.
Business plane
Answers
C.
Log plane
C.
Log plane
Answers
D.
Data forwarding plane
D.
Data forwarding plane
Answers
Suggested answer: D

The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide Analyze the suspicious object, which of the following options are its main features? (multiple choices)

A.
Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so Not vulnerable to attack.
A.
Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so Not vulnerable to attack.
Answers
B.
The monitoring speed is fast (the problem can be found in microseconds or seconds, and the hostbased DS needs to take an analysis of the audit transcripts in the last few minutes
B.
The monitoring speed is fast (the problem can be found in microseconds or seconds, and the hostbased DS needs to take an analysis of the audit transcripts in the last few minutes
Answers
C.
Need a lot of monitors.
C.
Need a lot of monitors.
Answers
D.
It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.
D.
It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.
Answers
Suggested answer: A, B

Huawei USG6000 products can scan and process certain file transfer protocols for viruses, but which of the following protocols is not included?

A.
POP3
A.
POP3
Answers
B.
IMAP
B.
IMAP
Answers
C.
FTP
C.
FTP
Answers
D.
TFTP
D.
TFTP
Answers
Suggested answer: D
Total 367 questions
Go to page: of 37