ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

Which of the following describes the business process of the network trapping scheme wrong?

(single selection).

The attacker initiates a network scanning attack The purpose is to probe the network structure.
The attacker initiates a network scanning attack The purpose is to probe the network structure.
The business that the attacker eventually attacks is a deliberately constructed counterfeit food business. Therefore, all the actions of the attacker are monitored and reported to the CIS platform
The business that the attacker eventually attacks is a deliberately constructed counterfeit food business. Therefore, all the actions of the attacker are monitored and reported to the CIS platform
When the access traffic reaches the trapping probe A collision between the probe needle and the trap will be used to send the access flow to the trap
When the access traffic reaches the trapping probe A collision between the probe needle and the trap will be used to send the access flow to the trap
Trapping probes can analyze the frequency of scanning different destination IPs or ports for the same source address Then a virtual MAC responds to the attacker.
Trapping probes can analyze the frequency of scanning different destination IPs or ports for the same source address Then a virtual MAC responds to the attacker.
Suggested answer: B
asked 18/09/2024
Sharhonda Herman
54 questions

Question 162

Report Export Collapse

The following is a description of FW's audit conduct. Which one is correct? (single selection).

After you create or modify an audit profile , the configuration content takes effect immediately.
After you create or modify an audit profile , the configuration content takes effect immediately.
By default , the audit function of outgoing file content is enabled by default.
By default , the audit function of outgoing file content is enabled by default.
By default HTTP status code audit mode is the default mode Only common HTTP status codes areaudited.
By default HTTP status code audit mode is the default mode Only common HTTP status codes areaudited.
Suggested answer: C
asked 18/09/2024
Mikolaj Roeper
41 questions

Question 163

Report Export Collapse

Which of the following situational aware detection attacks can DDOS attacks, firewall bypasses, and malware outreach attacks know? (multiple selection).

C&C anomaly detection
C&C anomaly detection
Hidden channel detection
Hidden channel detection
Encrypted traffic detection
Encrypted traffic detection
Meteor base rod anomaly detection
Meteor base rod anomaly detection
Suggested answer: A, B, C, D
asked 18/09/2024
Lethabane Reuben
41 questions

Question 164

Report Export Collapse

Which of the following devices can work with situational awareness to isolate infected hosts? (single selection).

Agile-controller Campus
Agile-controller Campus
gile-controller DCN
gile-controller DCN
SecoManager
SecoManager
EDR
EDR
Suggested answer: A
asked 18/09/2024
JULIUS BALNEG
42 questions

Question 165

Report Export Collapse

The IPS function of Huawei's intrusion prevention device is not controlled by License (radio selection).

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

The collection of subdomains includes the collection (single selection) of the target's top-level domain name, second-level domain name, third-level domain name and other domain names

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

When you use ATIC for defense policy configuration, the defense system that can be configured does not include which of the following options> (single selection).

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

With the following description of network scanning defense technology, which is correct? (single selection).

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

Which of the following threats cannot be detected by the sandbox virtual execution environment?

(Single selection)

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

The following describes the network scanning defense technology Which one is wrong? (single selection).

Become a Premium Member for full access
  Unlock Premium Member
Total 276 questions
Go to page: of 28

Related questions