ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Nicolas Da Silva
47 questions

Question 52

Report Export Collapse

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

Data analysis, data classification, post-processing
Data analysis, data classification, post-processing
Data processing, data classification, post-processing
Data processing, data classification, post-processing
Data processing, attack classification, post-processing
Data processing, attack classification, post-processing
Data processing, data classification, attack playback
Data processing, data classification, attack playback
Suggested answer: B
Explanation:

155955cc-666171a2-20fac832-0c042c0412

asked 18/09/2024
Soma Ismael Bola
41 questions

Question 53

Report Export Collapse

The results of the RBL black and white list query on the firewall are as follows:

Huawei H12-724 image Question 53 32985 09182024192736000000

Based on the above information only, which of the following statements is correct? (multiple choice)

Mail with source address 10.17.1.0/24 will be blocked
Mail with source address 10.17.1.0/24 will be blocked
Mail with source address 10.18.1.0/24 will be blocked
Mail with source address 10.18.1.0/24 will be blocked
Mail with source address 10.17.1.0/24 will be released
Mail with source address 10.17.1.0/24 will be released
Mail with source address 10.18.1.0/24 will be released
Mail with source address 10.18.1.0/24 will be released
Suggested answer: C, D
asked 18/09/2024
Komalaharshini Basireddygari
48 questions

Question 54

Report Export Collapse

Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition Contains content, the device can block or alert traffic containing specific keywords.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Chien-Chung Chen
39 questions

Question 55

Report Export Collapse

Which of the following options is not a special message attack?

ICMP redirect message attack) 0l
ICMP redirect message attack) 0l
Oversized ICMP packet attack
Oversized ICMP packet attack
Tracert packet attack
Tracert packet attack
IP fragment message item
IP fragment message item
Suggested answer: D
asked 18/09/2024
Gufran Dalwai
52 questions

Question 56

Report Export Collapse

Regarding worms and viruses, which of the following statements is correct?

Worms exist in a parasitic way155955cc-666171a2-20fac832-0c042c0413
Worms exist in a parasitic way155955cc-666171a2-20fac832-0c042c0413
Viruses mainly rely on system vulnerabilities to spread
Viruses mainly rely on system vulnerabilities to spread
The target of the worm infection is other computer systems on the network.
The target of the worm infection is other computer systems on the network.
The virus exists independently in the computer system.
The virus exists independently in the computer system.
Suggested answer: C
asked 18/09/2024
Salah Dabwan
30 questions

Question 57

Report Export Collapse

Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve For confidentiality, integrity and availability. ,

True
True
False
False
Suggested answer: A
asked 18/09/2024
Yun-Ting Lo
44 questions

Question 58

Report Export Collapse

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

Planting malware
Planting malware
Vulnerability attack
Vulnerability attack
Web application attacks
Web application attacks
Brute force
Brute force
Suggested answer: A
asked 18/09/2024
Aimé Tameti
45 questions

Question 59

Report Export Collapse

Which of the following options will not pose a security threat to the network?

Hacking
Hacking
Weak personal safety awareness
Weak personal safety awareness
Open company confidential files
Open company confidential files
Failure to update the virus database in time
Failure to update the virus database in time
Suggested answer: C
asked 18/09/2024
ALBERTO BONATO
49 questions

Question 60

Report Export Collapse

Regarding computer viruses, which of the following options is correct?

Patching the system can completely solve the virus intrusion problem
Patching the system can completely solve the virus intrusion problem
Computer viruses are latent, they may be latent for a long time, and only when they encounter certain conditions will they begin to carry out sabotage activities
Computer viruses are latent, they may be latent for a long time, and only when they encounter certain conditions will they begin to carry out sabotage activities
Computer viruses are contagious. They can spread through floppy disks and CDs, but they will not spread through the Internet.
Computer viruses are contagious. They can spread through floppy disks and CDs, but they will not spread through the Internet.
All computer viruses must be parasitic in files and cannot exist independently
All computer viruses must be parasitic in files and cannot exist independently
Suggested answer: B
asked 18/09/2024
pheangphadhu pravitpinyo
47 questions
Total 367 questions
Go to page: of 37
Search

Related questions