Huawei H12-724 Practice Test - Questions Answers, Page 9
List of questions
Related questions
Which of the following behaviors is a false positive of the intrusion detection system?
Regarding the 3 abnormal situations of the file type recognition result, which of the following option descriptions is wrong?
Regarding intrusion prevention, which of the following option descriptions is wrong
Abnormal detection is to establish the normal behavior characteristic profile of the system subject through the analysis of the audit data of the system: check if the audit data in the system If there is a big discrepancy with the normal behavior characteristics of the established subject, it is considered an intrusion. Nasu must be used as the system subject? (multiple choice)
Which of the following options is correct for the description of the Anti DDoS system configuration?
Which of the following threats cannot be detected by IPS?
When using the misuse check technology, if the normal user behavior is successfully matched with the intrusion feature knowledge base, it will be falsely reported.
The anti-tampering technology of Huawei WAF products is based on the cache module. Suppose that when user A visits website B, website B has page tampering.
Signs: The workflow for the WAF tamper-proof module has the following steps:.
① WAF uses the pages in the cache to return to the client;
②WAF compares the watermark of the server page content with the page content in the cache
③Store the content of the page in the cache after learning
④ When the user accesses the Web page, the WAF obtains the page content of the server
⑤ WAF starts the learning mode to learn the page content of the user's visit to the website;
For the ordering of these steps, which of the following options is correct?
Which of the following options is not a defense against HTTP Flood attacks?
The administrator has made the following configuration:
Question