Huawei H12-724 Practice Test - Questions Answers, Page 7

List of questions
Question 61

Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
Question 62

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment Anti-Virus, IPS, spam detection and other equipment.
Question 63

When a virus is detected in an email, which of the following is not the corresponding action for detection?
Question 64

Which of the following options is not a cyber security threat caused by weak personal security awareness?
Question 65

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)
Question 66

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?
Question 67

Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.
Question 68

The user needs of a university are as follows:
Question 69

For special message attacks, which of the following option descriptions is correct?
Answer:
Explanation:
Question 70

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.
Note to the original link, which of the following options does not belong to the method of reinjection?
Question