ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees.

These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklistitem:

At the same time, set it in the custom URL category.

A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the above configuration, which of the following statements are correct? (More select)

A.
Users can visit www.videobt.com website.
A.
Users can visit www.videobt.com website.
Answers
B.
The user can visit the www.bt.com website, but the administrator will receive a warning message.
B.
The user can visit the www.bt.com website, but the administrator will receive a warning message.
Answers
C.
User cannot access all the sites ending with bt com.
C.
User cannot access all the sites ending with bt com.
Answers
D.
When users visit www.bt. com, they will be blocked.
D.
When users visit www.bt. com, they will be blocked.
Answers
Suggested answer: A, D

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

A.
Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.
A.
Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.
Answers
B.
Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.
B.
Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.
Answers
C.
With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.
C.
With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.
Answers
D.
Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.
D.
Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.
Answers
Suggested answer: A, C

Explanation:

155955cc-666171a2-20fac832-0c042c0416

Which of the following are typical intrusions? "Multiple choice)

A.
Computer is infected by U disk virus
A.
Computer is infected by U disk virus
Answers
B.
Abnormal power interruption in the computer room
B.
Abnormal power interruption in the computer room
Answers
C.
Tampering with Web pages
C.
Tampering with Web pages
Answers
D.
Copy/view sensitive data
D.
Copy/view sensitive data
Answers
Suggested answer: C, D

In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.

"Hand in" to activate.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Regarding the enhanced mode in HTTP Flood source authentication, which of the followingdescriptions are correct? Multiple choices

A.
Enhanced mode refers to the authentication method using verification code.
A.
Enhanced mode refers to the authentication method using verification code.
Answers
B.
Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
B.
Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
Answers
C.
The enhanced mode is superior to the basic mode in terms of user experience.
C.
The enhanced mode is superior to the basic mode in terms of user experience.
Answers
D.
Enhanced mode supports all HTTP Flood source authentication fields. "WWQQ: 922333
D.
Enhanced mode supports all HTTP Flood source authentication fields. "WWQQ: 922333
Answers
Suggested answer: A, B

Regarding the mail content filtering configuration of Huawei USG6000 products, which of the following statements is wrong?.

A.
Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.
A.
Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.
Answers
B.
When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o
B.
When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o
Answers
C.
When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.
C.
When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.
Answers
D.
The attachment size limit is for a single attachment, not for the total size of all attachments.
D.
The attachment size limit is for a single attachment, not for the total size of all attachments.
Answers
Suggested answer: B

In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.

"Hand in" to activate.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Regarding the enhanced mode in HTTP Flood source authentication, which of the followingdescriptions are correct? Multiple choices

A.
Enhanced mode refers to the authentication method using verification code.
A.
Enhanced mode refers to the authentication method using verification code.
Answers
B.
Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
B.
Some bots have a redirection function, or the free proxy used during the attack supports the redirection function, which leads to the failure of the basic mode of defense Effective, enhanced mode can effectively defend.
Answers
C.
The enhanced mode is superior to the basic mode in terms of user experience.
C.
The enhanced mode is superior to the basic mode in terms of user experience.
Answers
D.
Enhanced mode supports all HTTP Flood source authentication fields. "WWQQ: 922333
D.
Enhanced mode supports all HTTP Flood source authentication fields. "WWQQ: 922333
Answers
Suggested answer: A, B

Regarding the mail content filtering configuration of Huawei USG6000 products, which of the following statements is wrong?.

A.
Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.
A.
Mail filtering will only take effect when the mail filtering configuration file is invoked when the security policy is allowed.
Answers
B.
When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o
B.
When a POP3 message is detected, if it is judged to be an illegal email, the firewall's response action only supports sending alarm information, and will not block the email o
Answers
C.
When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.
C.
When an IMAP message is detected, if it is judged to be an illegal email; the firewall's response action only supports sending alarm messages and will not block the email.
Answers
D.
The attachment size limit is for a single attachment, not for the total size of all attachments.
D.
The attachment size limit is for a single attachment, not for the total size of all attachments.
Answers
Suggested answer: B
Total 367 questions
Go to page: of 37