ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 14

Add to Whishlist

List of questions

Question 131

Report Export Collapse

If you can successfully access www.huawei.com network resources, which of the following protocols is not involved? (single selection).

HTTP
HTTP
TCP
TCP
DNS
DNS
Telnet
Telnet
Suggested answer: D
asked 18/09/2024
Eduardo Rives
43 questions

Question 132

Report Export Collapse

In which of the following cyberattacks might a virus attack be applied? (Multiple selection)

Sabotage
Sabotage
Infiltration
Infiltration
Elevation of power
Elevation of power
Information Collection
Information Collection
Suggested answer: A, B, C, D
asked 18/09/2024
Bogdan Paun
37 questions

Question 133

Report Export Collapse

With the following description of the difference between stored XSS and reflected XSS, what are the correct items? (multiple selection).

Attacks caused by stored XSS are persistent
Attacks caused by stored XSS are persistent
The attack code of stored XSS is stored on the target server
The attack code of stored XSS is stored on the target server
The attack code of the reflected XSS is stored on the target server
The attack code of the reflected XSS is stored on the target server
Attacks caused by reflective XSS are persistent
Attacks caused by reflective XSS are persistent
Suggested answer: A, B
asked 18/09/2024
ayodele fakayode
44 questions

Question 134

Report Export Collapse

The target IP address information can be collected through attacks, such as distributed denial-ofservice attacks to obtain the target's IP information. (single selection).

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Felix Maroto Roman
52 questions

Question 135

Report Export Collapse

The following is a description of wide management Which one is incorrect? (single selection).

The functions of ensuring width and forwarding priority can only have an effect on traffic flowing through the firewall
The functions of ensuring width and forwarding priority can only have an effect on traffic flowing through the firewall
Enabling the bandwidth management function will occupy the CPU resources of the device
Enabling the bandwidth management function will occupy the CPU resources of the device
If width management is used at the same time as the NAT Server function When configuring the destination address of the bandwidth management policy, you should specify the address before translation
If width management is used at the same time as the NAT Server function When configuring the destination address of the bandwidth management policy, you should specify the address before translation
If bandwidth management and source NAT are used at the same time, you should specify the address before translation when configuring the source address matching condition of the bandwidth policy
If bandwidth management and source NAT are used at the same time, you should specify the address before translation when configuring the source address matching condition of the bandwidth policy
Suggested answer: C
asked 18/09/2024
takasuka masahide
43 questions

Question 136

Report Export Collapse

Which of the following can be used to block C&C attacks? (multiple selection).

RAT (Remote Access Tools)??
RAT (Remote Access Tools)??
DGA (Domain Generation Algorithm. Domain name generation algorithm) domain name detection
DGA (Domain Generation Algorithm. Domain name generation algorithm) domain name detection
Perform environment detection virtually
Perform environment detection virtually
Matching silkworm library
Matching silkworm library
Suggested answer: A, B
asked 18/09/2024
David Aghaegbuna
45 questions

Question 137

Report Export Collapse

In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Nicklas Magnusson
46 questions

Question 138

Report Export Collapse

Which is the correct order for IPS to process traffic? (single selection).

Data reorganization, > characteristic matching, > application identification, > corresponding processing
Data reorganization, > characteristic matching, > application identification, > corresponding processing
Corresponding processing, data reorganization, > trait matching, application identification
Corresponding processing, data reorganization, > trait matching, application identification
Corresponding treatment, characteristics matching. Application identification, data reorganization
Corresponding treatment, characteristics matching. Application identification, data reorganization
Data reorganization. App recognition. Trait matching. Deal accordingly
Data reorganization. App recognition. Trait matching. Deal accordingly
Suggested answer: D
asked 18/09/2024
Subramaniam Pratheep
43 questions

Question 139

Report Export Collapse

In the WAF defense-in-depth system, which of the following security checks is used to protect against CC attacks? (single selection).

Content security check
Content security check
Access behavior security check
Access behavior security check
Security checks for sensitive information
Security checks for sensitive information
Network security inspection
Network security inspection
Suggested answer: B
asked 18/09/2024
Jonathan Marboux
38 questions

Question 140

Report Export Collapse

Digital signature technology can guarantee the credibility of the data source and verify whether the data has been tampered with during transmission. (Single selection)

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Elias Lopez III
51 questions
Total 276 questions
Go to page: of 28

Related questions