ExamGecko
Home / Huawei / H12-724 / List of questions
Ask Question

Huawei H12-724 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Which of the following behaviors is a false positive of the intrusion detection system?

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

Regarding intrusion prevention, which of the following option descriptions is wrong

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

Which of the following options is correct for the description of the Anti DDoS system configuration?

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

Which of the following threats cannot be detected by IPS?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.

Signs: The workflow for the WAF tamper-proof module has the following steps:.

WAF uses the pages in the cache to return to the client;

WAF compares the watermark of the server page content with the page content in the cache

Store the content of the page in the cache after learning

When the user accesses the Web page, the WAF obtains the page content of the server

WAF starts the learning mode to learn the page content of the user's visit to the website;

For the ordering of these steps, which of the following options is correct?

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

Which of the following options is not a defense against HTTP Flood attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

The administrator has made the following configuration:

Become a Premium Member for full access
  Unlock Premium Member
Total 367 questions
Go to page: of 37

Related questions