ExamGecko
Home Home / Huawei / H12-724

Huawei H12-724 Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











Which of the following behaviors is a false positive of the intrusion detection system?

A.
Unable to detect new types of worms
A.
Unable to detect new types of worms
Answers
B.
The process of trying to log in to the system is recorded
B.
The process of trying to log in to the system is recorded
Answers
C.
Use Ping to perform network detection and be alerted as an attack
C.
Use Ping to perform network detection and be alerted as an attack
Answers
D.
Web-based attacks are not detected by the system
D.
Web-based attacks are not detected by the system
Answers
Suggested answer: C

Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?

A.
File extension mismatch means that the file type is inconsistent with the file extension.
A.
File extension mismatch means that the file type is inconsistent with the file extension.
Answers
B.
Unrecognized file type means that the file type cannot be recognized and there is no file extension.
B.
Unrecognized file type means that the file type cannot be recognized and there is no file extension.
Answers
C.
File damage means that the file type cannot be identified because the file is damaged.
C.
File damage means that the file type cannot be identified because the file is damaged.
Answers
D.
Unrecognized file type means that the file type cannot be recognized, and the file extension cannot be recognized.
D.
Unrecognized file type means that the file type cannot be recognized, and the file extension cannot be recognized.
Answers
Suggested answer: D

Regarding intrusion prevention, which of the following option descriptions is wrong

A.
Intrusion prevention is a new security defense technology that can detect and prevent intrusions.
A.
Intrusion prevention is a new security defense technology that can detect and prevent intrusions.
Answers
B.
Intrusion prevention is a security mechanism that detects intrusions (including buffer overflow attacks, Trojan horses, worms, etc.) by analyzing network traffic
B.
Intrusion prevention is a security mechanism that detects intrusions (including buffer overflow attacks, Trojan horses, worms, etc.) by analyzing network traffic
Answers
C.
Intrusion prevention can block attacks in real time.
C.
Intrusion prevention can block attacks in real time.
Answers
D.
Intrusion prevention technology, after discovering an intrusion, the firewall must be linked to prevent the intrusion
D.
Intrusion prevention technology, after discovering an intrusion, the firewall must be linked to prevent the intrusion
Answers
Suggested answer: D

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)

A.
Host
A.
Host
Answers
B.
A group of users
B.
A group of users
Answers
C.
Single user
C.
Single user
Answers
D.
A key program and file in the system
D.
A key program and file in the system
Answers
Suggested answer: A, B, C, D

Which of the following options is correct for the description of the Anti DDoS system configuration?

A.
Configure drainage and re-injection on the testing equipment.
A.
Configure drainage and re-injection on the testing equipment.
Answers
B.
Configure port mirroring on the cleaning device.
B.
Configure port mirroring on the cleaning device.
Answers
C.
Add protection objects on the management center.
C.
Add protection objects on the management center.
Answers
D.
Configure drainage and re-injection on the management center.
D.
Configure drainage and re-injection on the management center.
Answers
Suggested answer: C

Which of the following threats cannot be detected by IPS?

A.
Virus
A.
Virus
Answers
B.
Worms
B.
Worms
Answers
C.
Spam
C.
Spam
Answers
D.
DoS
D.
DoS
Answers
Suggested answer: C

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.

Signs: The workflow for the WAF tamper-proof module has the following steps:.

WAF uses the pages in the cache to return to the client;

WAF compares the watermark of the server page content with the page content in the cache

Store the content of the page in the cache after learning

When the user accesses the Web page, the WAF obtains the page content of the server

WAF starts the learning mode to learn the page content of the user's visit to the website;

For the ordering of these steps, which of the following options is correct?

A.
③④②⑥①
A.
③④②⑥①
Answers
B.
⑤①③④③
B.
⑤①③④③
Answers
C.
②④①⑤③
C.
②④①⑤③
Answers
D.
⑤③④②①
D.
⑤③④②①
Answers
Suggested answer: D

Which of the following options is not a defense against HTTP Flood attacks?

A.
HTTP Flood source authentication
A.
HTTP Flood source authentication
Answers
B.
HTTP source statistics
B.
HTTP source statistics
Answers
C.
URI source fingerprint learning function
C.
URI source fingerprint learning function
Answers
D.
Baseline learning
D.
Baseline learning
Answers
Suggested answer: D

The administrator has made the following configuration:

A.
The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
A.
The signature set Protect_ all includes the signature ID3000, and the overall action of the signature set is to block.
Answers
B.
The action of overwriting signature ID3000 is an alarm.
B.
The action of overwriting signature ID3000 is an alarm.
Answers
C.
The action of signing iD3000 is an alarm
C.
The action of signing iD3000 is an alarm
Answers
D.
The action of signing ID3000 is to block
D.
The action of signing ID3000 is to block
Answers
E.
Unable to determine the action of signature ID3000
E.
Unable to determine the action of signature ID3000
Answers
F.
The signature set is not related to the coverage signature
F.
The signature set is not related to the coverage signature
Answers
Suggested answer: A
Total 367 questions
Go to page: of 37