ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Malicious code usually uses RootKit technology in order to hide itself. RootKit modifies the kernel of the system by loading a special driver.

To hide itself and the role of designated files.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Analysis is the core function of intrusion detection. The analysis and processing process of intrusion detection can be divided into three phases; build an analyzer to perform analysis on actual field data.

Which of the analysis, feedback and refinement is the function included in the first two stages?

A.
Data analysis, data classification, post-processing
A.
Data analysis, data classification, post-processing
Answers
B.
Data processing, data classification, post-processing
B.
Data processing, data classification, post-processing
Answers
C.
Data processing, attack classification, post-processing
C.
Data processing, attack classification, post-processing
Answers
D.
Data processing, data classification, attack playback
D.
Data processing, data classification, attack playback
Answers
Suggested answer: B

Explanation:

155955cc-666171a2-20fac832-0c042c0412

The results of the RBL black and white list query on the firewall are as follows:

Based on the above information only, which of the following statements is correct? (multiple choice)

A.
Mail with source address 10.17.1.0/24 will be blocked
A.
Mail with source address 10.17.1.0/24 will be blocked
Answers
B.
Mail with source address 10.18.1.0/24 will be blocked
B.
Mail with source address 10.18.1.0/24 will be blocked
Answers
C.
Mail with source address 10.17.1.0/24 will be released
C.
Mail with source address 10.17.1.0/24 will be released
Answers
D.
Mail with source address 10.18.1.0/24 will be released
D.
Mail with source address 10.18.1.0/24 will be released
Answers
Suggested answer: C, D

Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition Contains content, the device can block or alert traffic containing specific keywords.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options is not a special message attack?

A.
ICMP redirect message attack) 0l
A.
ICMP redirect message attack) 0l
Answers
B.
Oversized ICMP packet attack
B.
Oversized ICMP packet attack
Answers
C.
Tracert packet attack
C.
Tracert packet attack
Answers
D.
IP fragment message item
D.
IP fragment message item
Answers
Suggested answer: D

Regarding worms and viruses, which of the following statements is correct?

A.
Worms exist in a parasitic way155955cc-666171a2-20fac832-0c042c0413
A.
Worms exist in a parasitic way155955cc-666171a2-20fac832-0c042c0413
Answers
B.
Viruses mainly rely on system vulnerabilities to spread
B.
Viruses mainly rely on system vulnerabilities to spread
Answers
C.
The target of the worm infection is other computer systems on the network.
C.
The target of the worm infection is other computer systems on the network.
Answers
D.
The virus exists independently in the computer system.
D.
The virus exists independently in the computer system.
Answers
Suggested answer: C

Information security is the protection of information and information systems to prevent unauthorized access, use, leakage, interruption, modification, damage, and to improve For confidentiality, integrity and availability. ,

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

When you suspect that the company's network has been attacked by hackers, you have carried out a technical investigation. Which of the following options does not belong to the behavior that occurred in the early stage of the attack?

A.
Planting malware
A.
Planting malware
Answers
B.
Vulnerability attack
B.
Vulnerability attack
Answers
C.
Web application attacks
C.
Web application attacks
Answers
D.
Brute force
D.
Brute force
Answers
Suggested answer: A

Which of the following options will not pose a security threat to the network?

A.
Hacking
A.
Hacking
Answers
B.
Weak personal safety awareness
B.
Weak personal safety awareness
Answers
C.
Open company confidential files
C.
Open company confidential files
Answers
D.
Failure to update the virus database in time
D.
Failure to update the virus database in time
Answers
Suggested answer: C

Regarding computer viruses, which of the following options is correct?

A.
Patching the system can completely solve the virus intrusion problem
A.
Patching the system can completely solve the virus intrusion problem
Answers
B.
Computer viruses are latent, they may be latent for a long time, and only when they encounter certain conditions will they begin to carry out sabotage activities
B.
Computer viruses are latent, they may be latent for a long time, and only when they encounter certain conditions will they begin to carry out sabotage activities
Answers
C.
Computer viruses are contagious. They can spread through floppy disks and CDs, but they will not spread through the Internet.
C.
Computer viruses are contagious. They can spread through floppy disks and CDs, but they will not spread through the Internet.
Answers
D.
All computer viruses must be parasitic in files and cannot exist independently
D.
All computer viruses must be parasitic in files and cannot exist independently
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37