Huawei H12-724 Practice Test - Questions Answers, Page 6
List of questions
Question 51
Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.
To hide itself and the role of designated files.
Question 52
Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.
Which of the analysis, feedback and refinement is the function included in the first two stages?
155955cc-666171a2-20fac832-0c042c0412
Question 53
The results of the RBL black and white list query on the firewall are as follows:
Based on the above information only, which of the following statements is correct? (multiple choice)
Question 54
Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition Contains content, the device can block or alert traffic containing specific keywords.
Question 55
Which of the following options is not a special message attack?
Question 56
Regarding worms and viruses, which of the following statements is correct?
Question 57
Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve For confidentiality, integrity and availability. ,
Question 58
When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?
Question 59
Which of the following options will not pose a security threat to the network?
Question 60
Regarding computer viruses, which of the following options is correct?
Question