ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?

A.
Local reputation MD5 cache only has static cache, which needs to be updated regularly
A.
Local reputation MD5 cache only has static cache, which needs to be updated regularly
Answers
B.
File reputation database can only be upgraded by manual upgrade
B.
File reputation database can only be upgraded by manual upgrade
Answers
C.
File reputation is to perform virus detection by calculating the full text MD5 of the file to be tested and matching it with the local reputation MD5 cache
C.
File reputation is to perform virus detection by calculating the full text MD5 of the file to be tested and matching it with the local reputation MD5 cache
Answers
D.
File reputation database update and upgrade can only be achieved through linkage with sandbox
D.
File reputation database update and upgrade can only be achieved through linkage with sandbox
Answers
Suggested answer: C

Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment Anti-Virus, IPS, spam detection and other equipment.

A.
True155955cc-666171a2-20fac832-0c042c0414
A.
True155955cc-666171a2-20fac832-0c042c0414
Answers
B.
False
B.
False
Answers
Suggested answer: B

When a virus is detected in an email, which of the following is not the corresponding action for detection?

A.
Warning
A.
Warning
Answers
B.
Block
B.
Block
Answers
C.
Declare
C.
Declare
Answers
D.
Delete attachments
D.
Delete attachments
Answers
Suggested answer: B

Which of the following options is not a cyber security threat caused by weak personal security awareness?

A.
Disclosure of personal information
A.
Disclosure of personal information
Answers
B.
Threats to the internal network
B.
Threats to the internal network
Answers
C.
Leaking corporate information
C.
Leaking corporate information
Answers
D.
Increasing the cost of enterprise network operation and maintenance
D.
Increasing the cost of enterprise network operation and maintenance
Answers
Suggested answer: D

In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)

A.
Warning
A.
Warning
Answers
B.
Block and push the page
B.
Block and push the page
Answers
C.
A warning dialog box pops up
C.
A warning dialog box pops up
Answers
D.
All access to the client is prohibited
D.
All access to the client is prohibited
Answers
Suggested answer: A, B

The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.

Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?

A.
TCP packets
A.
TCP packets
Answers
B.
UDP packet
B.
UDP packet
Answers
C.
ICMP message
C.
ICMP message
Answers
D.
FTP message
D.
FTP message
Answers
Suggested answer: D

Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The user needs of a university are as follows:

A.
The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
A.
The environment is large, and the total number of two-way traffic can reach 800M. Huawei USG6000 series firewall is deployed at its network node.
Answers
B.
The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
B.
The intranet is divided into student area, server area, etc., users are most concerned about the security of the server area to avoid attacks from various threats.
Answers
C.
At the same time, some pornographic websites in the student area are prohibited.The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?155955cc-666171a2-20fac832-0c042c0415
C.
At the same time, some pornographic websites in the student area are prohibited.The external network has been configured as an untrust zone and the internal network has been configured as a trust zone on the firewall. How to configure the firewall to meet the above requirements?155955cc-666171a2-20fac832-0c042c0415
Answers
D.
You can directly turn on the AV, IRS protection functions, and URL filtering functions in the global environment to achieve the requirements
D.
You can directly turn on the AV, IRS protection functions, and URL filtering functions in the global environment to achieve the requirements
Answers
E.
To the untrust direction, only enable AV and IPS protection functions for the server zone to protect the server
E.
To the untrust direction, only enable AV and IPS protection functions for the server zone to protect the server
Answers
F.
In the direction of untrust to the intranet, only the AV and IPS protection functions are turned on for the server area to protect the server
F.
In the direction of untrust to the intranet, only the AV and IPS protection functions are turned on for the server area to protect the server
Answers
G.
Go to the untrust direction to open the URL filtering function for the entire campus network, and filter some classified websites
G.
Go to the untrust direction to open the URL filtering function for the entire campus network, and filter some classified websites
Answers
Suggested answer: A, C, D

For special message attacks, which of the following option descriptions is correct?

A.
Special control packet attack is a potential attack and does not have direct destructive behavior
A.
Special control packet attack is a potential attack and does not have direct destructive behavior
Answers
B.
The attacker probes the network structure by sending special control messages to launch a real attack.
B.
The attacker probes the network structure by sending special control messages to launch a real attack.
Answers
C.
Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.
C.
Special control message attacks do not have the ability to detect the network structure. Only scanning attacks can detect the network.
Answers
D.
D.
Answers
Suggested answer:

Explanation:

Answer:

Explanation:

When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.

Note to the original link, which of the following options does not belong to the method of reinjection?

A.
Policy routing back annotation,
A.
Policy routing back annotation,
Answers
B.
GRE back note:
B.
GRE back note:
Answers
C.
MPLS LSP back injection
C.
MPLS LSP back injection
Answers
D.
BGP back-annotation
D.
BGP back-annotation
Answers
Suggested answer: D
Total 367 questions
Go to page: of 37