ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Related questions











If you can successfully access www.huawei.com network resources, which of the following protocols is not involved? (single selection).

A.
HTTP
A.
HTTP
Answers
B.
TCP
B.
TCP
Answers
C.
DNS
C.
DNS
Answers
D.
Telnet
D.
Telnet
Answers
Suggested answer: D

In which of the following cyberattacks might a virus attack be applied? (Multiple selection)

A.
Sabotage
A.
Sabotage
Answers
B.
Infiltration
B.
Infiltration
Answers
C.
Elevation of power
C.
Elevation of power
Answers
D.
Information Collection
D.
Information Collection
Answers
Suggested answer: A, B, C, D

With the following description of the difference between stored XSS and reflected XSS, what are the correct items? (multiple selection).

A.
Attacks caused by stored XSS are persistent
A.
Attacks caused by stored XSS are persistent
Answers
B.
The attack code of stored XSS is stored on the target server
B.
The attack code of stored XSS is stored on the target server
Answers
C.
The attack code of the reflected XSS is stored on the target server
C.
The attack code of the reflected XSS is stored on the target server
Answers
D.
Attacks caused by reflective XSS are persistent
D.
Attacks caused by reflective XSS are persistent
Answers
Suggested answer: A, B

The target IP address information can be collected through attacks, such as distributed denial-ofservice attacks to obtain the target's IP information. (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The following is a description of wide management Which one is incorrect? (single selection).

A.
The functions of ensuring width and forwarding priority can only have an effect on traffic flowing through the firewall
A.
The functions of ensuring width and forwarding priority can only have an effect on traffic flowing through the firewall
Answers
B.
Enabling the bandwidth management function will occupy the CPU resources of the device
B.
Enabling the bandwidth management function will occupy the CPU resources of the device
Answers
C.
If width management is used at the same time as the NAT Server function When configuring the destination address of the bandwidth management policy, you should specify the address before translation
C.
If width management is used at the same time as the NAT Server function When configuring the destination address of the bandwidth management policy, you should specify the address before translation
Answers
D.
If bandwidth management and source NAT are used at the same time, you should specify the address before translation when configuring the source address matching condition of the bandwidth policy
D.
If bandwidth management and source NAT are used at the same time, you should specify the address before translation when configuring the source address matching condition of the bandwidth policy
Answers
Suggested answer: C

Which of the following can be used to block C&C attacks? (multiple selection).

A.
RAT (Remote Access Tools)??
A.
RAT (Remote Access Tools)??
Answers
B.
DGA (Domain Generation Algorithm. Domain name generation algorithm) domain name detection
B.
DGA (Domain Generation Algorithm. Domain name generation algorithm) domain name detection
Answers
C.
Perform environment detection virtually
C.
Perform environment detection virtually
Answers
D.
Matching silkworm library
D.
Matching silkworm library
Answers
Suggested answer: A, B

In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which is the correct order for IPS to process traffic? (single selection).

A.
Data reorganization, > characteristic matching, > application identification, > corresponding processing
A.
Data reorganization, > characteristic matching, > application identification, > corresponding processing
Answers
B.
Corresponding processing, data reorganization, > trait matching, application identification
B.
Corresponding processing, data reorganization, > trait matching, application identification
Answers
C.
Corresponding treatment, characteristics matching. Application identification, data reorganization
C.
Corresponding treatment, characteristics matching. Application identification, data reorganization
Answers
D.
Data reorganization. App recognition. Trait matching. Deal accordingly
D.
Data reorganization. App recognition. Trait matching. Deal accordingly
Answers
Suggested answer: D

In the WAF defense-in-depth system, which of the following security checks is used to protect against CC attacks? (single selection).

A.
Content security check
A.
Content security check
Answers
B.
Access behavior security check
B.
Access behavior security check
Answers
C.
Security checks for sensitive information
C.
Security checks for sensitive information
Answers
D.
Network security inspection
D.
Network security inspection
Answers
Suggested answer: B

Digital signature technology can guarantee the credibility of the data source and verify whether the data has been tampered with during transmission. (Single selection)

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A
Total 276 questions
Go to page: of 28