ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions











Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network The source IP address matched in the security policy is the private IP address of the user.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

An important purpose of adopting a distributed denial-of-service attack architecture is to isolate network contacts Protect attackers... So that it will not be tracked by the monitoring system while the attack is in progress

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Let's see which devices can be used as Huawei CIS (Cybersecurity Intelligence system.). Trapping probes in network security intelligence systems?

A.
firewall
A.
firewall
Answers
B.
switchboard
B.
switchboard
Answers
C.
router
C.
router
Answers
D.
server
D.
server
Answers
Suggested answer: A, B

With the prevalence of e-commerce, online banking, e-government The business value of WEB servers is getting higher and higher, and the security threats faced by web servers are also increasing, and the defense against the web application layer has become an inevitable trend, WAF (WebApplication Firewall WEB APPLICATION FIREWALL) PRODUCTS BEGAN TO BECOME POPULAR.

As shown in the figure The firewall uses the deployment mode of transparent proxy About the deployment mode of WAF using transparent proxy Which of the following options is described incorrectly.

A.
You need to configure the IP address and route for the forwarding interface of the WAF
A.
You need to configure the IP address and route for the forwarding interface of the WAF
Answers
B.
The agent works in route-forwarding mode instead of bridge mode
B.
The agent works in route-forwarding mode instead of bridge mode
Answers
C.
JUDGING FROM THE ANGULARITY OF THE WEB CLIENT THE WEB CLIENT IS STILL DIRECTLY ACCESSING THE SERVER AND IS NOT AWARE OF THE EXISTENCE OF WAF
C.
JUDGING FROM THE ANGULARITY OF THE WEB CLIENT THE WEB CLIENT IS STILL DIRECTLY ACCESSING THE SERVER AND IS NOT AWARE OF THE EXISTENCE OF WAF
Answers
D.
Minimal network changes enable zero-configuration deployment
D.
Minimal network changes enable zero-configuration deployment
Answers
Suggested answer: A

The web reputation feature categorizes websites and differentiates them according to different classifications. When a user visits a potentially risky website, it can be promptly alerted or blocked by the system • thus helping the user quickly confirm the security of the target website. Which of the following options does not fall under the classification of Web Reputation Sites?

A.
Default trusted Web site
A.
Default trusted Web site
Answers
B.
Customize trusted websites
B.
Customize trusted websites
Answers
C.
Customize the suspicious station
C.
Customize the suspicious station
Answers
D.
Predefined trusted websites
D.
Predefined trusted websites
Answers
Suggested answer: A

With the continuous development of network technology The firewall is also completing its own upgrade The technology evolution that firewalls have undergone includes which of the following options

A.
Stateful Detection Firewall
A.
Stateful Detection Firewall
Answers
B.
App Proxy Firewall
B.
App Proxy Firewall
Answers
C.
Packet filtering firewall
C.
Packet filtering firewall
Answers
D.
Web firewall
D.
Web firewall
Answers
Suggested answer: A, B, C

NIP provides security mechanisms from multiple levels such as administrators and logs to build the security of operation and maintenance Which of the following security options are included?

A.
Administrator decentralization and domain management mechanism
A.
Administrator decentralization and domain management mechanism
Answers
B.
Anti-brute force mechanism
B.
Anti-brute force mechanism
Answers
C.
Protection mechanism for sensitive user information
C.
Protection mechanism for sensitive user information
Answers
D.
Access channel control
D.
Access channel control
Answers
Suggested answer: A, B, C, D

PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion processes, usually orchestrated by certain personnel For specific goals.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Employees visit illegal or malicious websites at will Viruses, Trojans, and worms will be attacked, so we need to enable URL filtering. Which of the following options is a feature of URL Shopping?

A.
Great impact on performance However, only HTTP/HTTPS access is controlled
A.
Great impact on performance However, only HTTP/HTTPS access is controlled
Answers
B.
The impact on performance is small And all services corresponding to the domain name can be controlled
B.
The impact on performance is small And all services corresponding to the domain name can be controlled
Answers
C.
Control in the domain name resolution stage, control the granularity Control can only be done down to the domain name level
C.
Control in the domain name resolution stage, control the granularity Control can only be done down to the domain name level
Answers
D.
Control is performed during the URL request phase of making HTTP/HTTPs Fine control granularityCan be controlled down to the directory and file level
D.
Control is performed during the URL request phase of making HTTP/HTTPs Fine control granularityCan be controlled down to the directory and file level
Answers
Suggested answer: A, D

Trojans due to infection of other files It also destroys computer systems, and at the same time replicates itself, so Trojans have the characteristics of traditional computer viruses.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B
Total 276 questions
Go to page: of 28