ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











The sandbox is actively protected against viruses (single selection)

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The following describes FW's application behavior control features Which one is correct? (single selection).

A.
For FTP behavior, application behavior control can limit the size of upload/download files, but cannot control the upload/download line separately
A.
For FTP behavior, application behavior control can limit the size of upload/download files, but cannot control the upload/download line separately
Answers
B.
For IM behavior You can set a black whitelist The priority relationship between the black and white list and the provincial action is: blacklist, white list, default action.
B.
For IM behavior You can set a black whitelist The priority relationship between the black and white list and the provincial action is: blacklist, white list, default action.
Answers
C.
When creating a security strategy Application behavior control and yellow files can be combined with users, time periods, and other objects to achieve the purpose of application control for different users and different time periods.D . For HTTP behavior The application behavior control function can be controlled by DEToperation in POST.
C.
When creating a security strategy Application behavior control and yellow files can be combined with users, time periods, and other objects to achieve the purpose of application control for different users and different time periods.D . For HTTP behavior The application behavior control function can be controlled by DEToperation in POST.
Answers
Suggested answer: C

In the Anh-DDos system What are the functions that ATIC can complete as a management center?

(multiple selection).

A.
reports an exception
A.
reports an exception
Answers
B.
Policy discipline
B.
Policy discipline
Answers
C.
Report management
C.
Report management
Answers
D.
Clean the flow
D.
Clean the flow
Answers
Suggested answer: B, C

Which of the following is wrong about Huawei's approach to business security resilience? (single selection).

A.
Achieve active security through correlation analysis and collaborative joint defense.
A.
Achieve active security through correlation analysis and collaborative joint defense.
Answers
B.
Abandon the traditional passive cyber threat defense mode and achieve security resilience with business as the center .
B.
Abandon the traditional passive cyber threat defense mode and achieve security resilience with business as the center .
Answers
C.
Use Al technology to compensate for the lag of threat defense.
C.
Use Al technology to compensate for the lag of threat defense.
Answers
D.
Active security and passive defense through the department Protect against attacks at all stages of the cyber attack chain.
D.
Active security and passive defense through the department Protect against attacks at all stages of the cyber attack chain.
Answers
Suggested answer: B

In the Anti-DDos system, the function of cleaning devices is to detect anomalous traffic in the network and escalate to the management centre (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

As shown in the following figure, you use the bypass method to deploy the Anti-DDoS system 8GP drainage UN route is used. The port numbers of the P1-P5 devices in the figure, what happens if a routing policy is not configured on R1 to direct cleansed traffic to P5? (single selection).

A.
After the inspection equipment is cleaned, it will be sent to the cleaning equipment again
A.
After the inspection equipment is cleaned, it will be sent to the cleaning equipment again
Answers
B.
The flow to be detected is discarded by the cleaning equipment
B.
The flow to be detected is discarded by the cleaning equipment
Answers
C.
The detection flow cannot be cleaned by Wang Chang
C.
The detection flow cannot be cleaned by Wang Chang
Answers
D.
The traffic to be detected cannot reach the detection equipment
D.
The traffic to be detected cannot reach the detection equipment
Answers
Suggested answer: A

Domain name information collection is the first step in technical means information collection Domain name information can be collected through a domain name lookup website such as hois (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

The following is a description of FW's DNS filtering feature What are the correct options? (multiple selection).

A.
The DNS overcast function has a great impact on the performance of the device compared to the URL overcast, but all services corresponding to the domain name can be controlled.
A.
The DNS overcast function has a great impact on the performance of the device compared to the URL overcast, but all services corresponding to the domain name can be controlled.
Answers
B.
DNS filtering can be controlled at the stage of initiating HTTP/HHPS URL requests.
B.
DNS filtering can be controlled at the stage of initiating HTTP/HHPS URL requests.
Answers
C.
DNS filtering can release or block requests for different time periods or different users/groups by referencing time periods or users/groups.
C.
DNS filtering can release or block requests for different time periods or different users/groups by referencing time periods or users/groups.
Answers
D.
The DNS filtering function is usually used in enterprise gateways to effectively manage users' access to network resources
D.
The DNS filtering function is usually used in enterprise gateways to effectively manage users' access to network resources
Answers
Suggested answer: C, D

The following is a description of the trapping technique The correct ones are which women's multiple choices).

A.
If the attacker cannot notice the fake service provided by the honeypot, the capture efficiency of the honeypot is relatively low
A.
If the attacker cannot notice the fake service provided by the honeypot, the capture efficiency of the honeypot is relatively low
Answers
B.
Honeypot technology is to absorb the network by deploying some king machines as bait Trick attackers into attacking them This allows attacks to be captured and analyzed
B.
Honeypot technology is to absorb the network by deploying some king machines as bait Trick attackers into attacking them This allows attacks to be captured and analyzed
Answers
C.
Discuss the access layer switch equipment as honeypot equipment
C.
Discuss the access layer switch equipment as honeypot equipment
Answers
D.
The honeypile can only passively wait for the attacker to attack
D.
The honeypile can only passively wait for the attacker to attack
Answers
Suggested answer: A, B, D

The sandbox and the firewall link anti-virus After the sandbox detects the virus file, the next information is fed back to the firewall (radio selection).

A.
Application
A.
Application
Answers
B.
Source IP
B.
Source IP
Answers
C.
URL
C.
URL
Answers
D.
File MD5
D.
File MD5
Answers
Suggested answer: D
Total 276 questions
Go to page: of 28