ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?

Local reputation MD5 cache only has static cache, which needs to be updated regularly
Local reputation MD5 cache only has static cache, which needs to be updated regularly
File reputation database can only be upgraded by manual upgrade
File reputation database can only be upgraded by manual upgrade
File reputation is to perform virus detection by calculating the full text MD5 of the file to be tested and matching it with the local reputation MD5 cache
File reputation is to perform virus detection by calculating the full text MD5 of the file to be tested and matching it with the local reputation MD5 cache
File reputation database update and upgrade can only be achieved through linkage with sandbox
File reputation database update and upgrade can only be achieved through linkage with sandbox
Suggested answer: C
asked 18/09/2024
Karabo Manye
37 questions

Question 62

Report Export Collapse

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment Anti-Virus, IPS, spam detection and other equipment.

True155955cc-666171a2-20fac832-0c042c0414
True155955cc-666171a2-20fac832-0c042c0414
False
False
Suggested answer: B
asked 18/09/2024
Haakon Schjelderup
59 questions

Question 63

Report Export Collapse

When a virus is detected in an email, which of the following is not the corresponding action for detection?

Warning
Warning
Block
Block
Declare
Declare
Delete attachments
Delete attachments
Suggested answer: B
asked 18/09/2024
Louis Flink
37 questions

Question 64

Report Export Collapse

Which of the following options is not a cyber security threat caused by weak personal security awareness?

Disclosure of personal information
Disclosure of personal information
Threats to the internal network
Threats to the internal network
Leaking corporate information
Leaking corporate information
Increasing the cost of enterprise network operation and maintenance
Increasing the cost of enterprise network operation and maintenance
Suggested answer: D
asked 18/09/2024
Muhammad Gul
48 questions

Question 65

Report Export Collapse

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

Warning
Warning
Block and push the page
Block and push the page
A warning dialog box pops up
A warning dialog box pops up
All access to the client is prohibited
All access to the client is prohibited
Suggested answer: A, B
asked 18/09/2024
Pieter Louw
46 questions

Question 66

Report Export Collapse

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.

Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?

TCP packets
TCP packets
UDP packet
UDP packet
ICMP message
ICMP message
FTP message
FTP message
Suggested answer: D
asked 18/09/2024
Mark Lalangan
46 questions

Question 67

Report Export Collapse

Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.

True
True
False
False
Suggested answer: A
asked 18/09/2024
Jackes Matos
46 questions

Question 68

Report Export Collapse

The user needs of a university are as follows:

The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
At the same time, some pornographic websites in the student area are prohibited.The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?155955cc-666171a2-20fac832-0c042c0415
At the same time, some pornographic websites in the student area are prohibited.The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?155955cc-666171a2-20fac832-0c042c0415
You can directly turn on the AV, IRS protection functions, and URL filtering functions in the global environment to achieve the requirements
You can directly turn on the AV, IRS protection functions, and URL filtering functions in the global environment to achieve the requirements
To the untrust direction, only enable AV and IPS protection functions for the server zone to protect the server
To the untrust direction, only enable AV and IPS protection functions for the server zone to protect the server
In the direction of untrust to the intranet, only the AV and IPS protection functions are turned on for the server area to protect the server
In the direction of untrust to the intranet, only the AV and IPS protection functions are turned on for the server area to protect the server
Go to the untrust direction to open the URL filtering function for the entire campus network, and filter some classified websites
Go to the untrust direction to open the URL filtering function for the entire campus network, and filter some classified websites
Suggested answer: A, C, D
asked 18/09/2024
Cynthia Gutknecht
48 questions

Question 69

Report Export Collapse

For special message attacks, which of the following option descriptions is correct?

Special control packet attack is a potential attack and does not have direct destructive behavior
Special control packet attack is a potential attack and does not have direct destructive behavior
The attacker probes the network structure by sending special control messages to launch a real attack.
The attacker probes the network structure by sending special control messages to launch a real attack.
Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.
Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.
Suggested answer:
Explanation:

Answer:

Explanation:

asked 18/09/2024
Dennis Bruyn
43 questions

Question 70

Report Export Collapse

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.

Note to the original link, which of the following options does not belong to the method of reinjection?

Policy routing back annotation,
Policy routing back annotation,
GRE back note:
GRE back note:
MPLS LSP back injection
MPLS LSP back injection
BGP back-annotation
BGP back-annotation
Suggested answer: D
asked 18/09/2024
Tammy Tran
34 questions
Total 367 questions
Go to page: of 37

Related questions