Huawei H12-724 Practice Test - Questions Answers, Page 7
List of questions
Question 61
Regarding the description of file reputation technology in anti-virus engines, which of the following options is correct?
Question 62
Since the sandbox can provide a virtual execution environment to detect files in the network, the sandbox can be substituted when deploying security equipment Anti-Virus, IPS, spam detection and other equipment.
Question 63
When a virus is detected in an email, which of the following is not the corresponding action for detection?
Question 64
Which of the following options is not a cyber security threat caused by weak personal security awareness?
Question 65
In the anti-virus policy configuration of Huawei USG6000 product, what are the response methods of HTTP protocol? (multiple choice)
Question 66
The most common form of child-like attack is to send a large number of seemingly legitimate packets to the target host through Flood, which ultimately leads to network bandwidth.
Or the equipment resources are exhausted. Which of the following options is not included in traffic attack packets?
Question 67
Buffer overflows, Trojan horses, and backdoor attacks are all attacks at the application layer.
Question 68
The user needs of a university are as follows:
Question 69
For special message attacks, which of the following option descriptions is correct?
Answer:
Explanation:
Question 70
When the Anti DDoS system finds the attack flow, the state will redirect the attack flow to the cleaning device. After the cleaning device is cleaned, it will flow back.
Note to the original link, which of the following options does not belong to the method of reinjection?
Question