Huawei H12-724 Practice Test - Questions Answers, Page 9

List of questions
Question 81

Which of the following behaviors is a false positive of the intrusion detection system?
Question 82

Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
Question 83

Regarding intrusion prevention, which of the following option descriptions is wrong
Question 84

Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)
Question 85

Which of the following options is correct for the description of the Anti DDoS system configuration?
Question 86

Which of the following threats cannot be detected by IPS?
Question 87

When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
Question 88

The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.
Signs: The workflow for the WAF tamper-proof module has the following steps:.
① WAF uses the pages in the cache to return to the client;
②WAF compares the watermark of the server page content with the page content in the cache
③Store the content of the page in the cache after learning
④ When the user accesses the Web page, the WAF obtains the page content of the server
⑤ WAF starts the learning mode to learn the page content of the user's visit to the website;
For the ordering of these steps, which of the following options is correct?
Question 89

Which of the following options is not a defense against HTTP Flood attacks?
Question 90

The administrator has made the following configuration:
Question