ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Related questions











Which of the following describes the business process of the network trapping scheme wrong?

(single selection).

A.
The attacker initiates a network scanning attack The purpose is to probe the network structure.
A.
The attacker initiates a network scanning attack The purpose is to probe the network structure.
Answers
B.
The business that the attacker eventually attacks is a deliberately constructed counterfeit food business. Therefore, all the actions of the attacker are monitored and reported to the CIS platform
B.
The business that the attacker eventually attacks is a deliberately constructed counterfeit food business. Therefore, all the actions of the attacker are monitored and reported to the CIS platform
Answers
C.
When the access traffic reaches the trapping probe A collision between the probe needle and the trap will be used to send the access flow to the trap
C.
When the access traffic reaches the trapping probe A collision between the probe needle and the trap will be used to send the access flow to the trap
Answers
D.
Trapping probes can analyze the frequency of scanning different destination IPs or ports for the same source address Then a virtual MAC responds to the attacker.
D.
Trapping probes can analyze the frequency of scanning different destination IPs or ports for the same source address Then a virtual MAC responds to the attacker.
Answers
Suggested answer: B

The following is a description of FW's audit conduct. Which one is correct? (single selection).

A.
After you create or modify an audit profile , the configuration content takes effect immediately.
A.
After you create or modify an audit profile , the configuration content takes effect immediately.
Answers
B.
By default , the audit function of outgoing file content is enabled by default.
B.
By default , the audit function of outgoing file content is enabled by default.
Answers
C.
By default HTTP status code audit mode is the default mode Only common HTTP status codes areaudited.
C.
By default HTTP status code audit mode is the default mode Only common HTTP status codes areaudited.
Answers
Suggested answer: C

Which of the following situational aware detection attacks can DDOS attacks, firewall bypasses, and malware outreach attacks know? (multiple selection).

A.
C&C anomaly detection
A.
C&C anomaly detection
Answers
B.
Hidden channel detection
B.
Hidden channel detection
Answers
C.
Encrypted traffic detection
C.
Encrypted traffic detection
Answers
D.
Meteor base rod anomaly detection
D.
Meteor base rod anomaly detection
Answers
Suggested answer: A, B, C, D

Which of the following devices can work with situational awareness to isolate infected hosts? (single selection).

A.
Agile-controller Campus
A.
Agile-controller Campus
Answers
B.
gile-controller DCN
B.
gile-controller DCN
Answers
C.
SecoManager
C.
SecoManager
Answers
D.
EDR
D.
EDR
Answers
Suggested answer: A

The IPS function of Huawei's intrusion prevention device is not controlled by License (radio selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The collection of subdomains includes the collection (single selection) of the target's top-level domain name, second-level domain name, third-level domain name and other domain names

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

When you use ATIC for defense policy configuration, the defense system that can be configured does not include which of the following options> (single selection).

A.
Blocking
A.
Blocking
Answers
B.
Current limiting
B.
Current limiting
Answers
C.
Defense
C.
Defense
Answers
D.
Detection
D.
Detection
Answers
Suggested answer: D

With the following description of network scanning defense technology, which is correct? (single selection).

A.
For port scanning, you can defend by setting the value of the access frequency bureau.
A.
For port scanning, you can defend by setting the value of the access frequency bureau.
Answers
B.
If the access frequency is set too high More false positives will be generated, blocking normal access traffic.
B.
If the access frequency is set too high More false positives will be generated, blocking normal access traffic.
Answers
C.
If the rate at which its source IP accesses other protected addresses or ports exceeds the set access frequency threshold, this behavior is regarded as scanning behavior And add the purpose to the blacklist to block scan
C.
If the rate at which its source IP accesses other protected addresses or ports exceeds the set access frequency threshold, this behavior is regarded as scanning behavior And add the purpose to the blacklist to block scan
Answers
D.
If the frequency of the set direction is too low The scanning behavior is not recognized.
D.
If the frequency of the set direction is too low The scanning behavior is not recognized.
Answers
Suggested answer: C

Which of the following threats cannot be detected by the sandbox virtual execution environment?

(Single selection)

A.
C&C??
A.
C&C??
Answers
B.
PDF file virus
B.
PDF file virus
Answers
C.
PE file virus
C.
PE file virus
Answers
D.
Web file virus
D.
Web file virus
Answers
Suggested answer: A

The following describes the network scanning defense technology Which one is wrong? (single selection).

A.
The trapping probe has a business simulation function.
A.
The trapping probe has a business simulation function.
Answers
B.
Firewalls and switch devices can act as trapping probes.
B.
Firewalls and switch devices can act as trapping probes.
Answers
C.
In networking mode where the trap and the trap probe are on the same firewall| CIS and SecoManager are not required for trapping Closed-loop threat linkage can be completed directly through FW.
C.
In networking mode where the trap and the trap probe are on the same firewall| CIS and SecoManager are not required for trapping Closed-loop threat linkage can be completed directly through FW.
Answers
D.
The trapping system produces a unique fingerprint for each attacker Able to record hacker IP, operating system Information such as browser type, type of attack weapon, etC.
D.
The trapping system produces a unique fingerprint for each attacker Able to record hacker IP, operating system Information such as browser type, type of attack weapon, etC.
Answers
Suggested answer: A
Total 276 questions
Go to page: of 28