ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

Which of the following options are the main dangers of computer Trojans?

User files are corrupted
User files are corrupted
Illegal remote control of a computer
Illegal remote control of a computer
Personal accounts, passwords and other information are stolen
Personal accounts, passwords and other information are stolen
Cause the system to slow down or even freeze
Cause the system to slow down or even freeze
Suggested answer: A, B, C, D
asked 18/09/2024
Freddy KUBIAK
58 questions

Question 72

Report Export Collapse

When the Abnormal Traffic Inspection & Control System^ defense strategy of the Abnormal Traffic Monitoring System ATIC selects the anti-uninstall action, it utilizes the status code (targeted) for which of the following options GET request method redirection) to prove the true identity of the client?

300
300
301
301
303
303
302
302
Suggested answer: D
asked 18/09/2024
Mike van den Berg
41 questions

Question 73

Report Export Collapse

Whitelisting may not properly handle complex obfuscation, which could allow attackers to subvert filters and potentially inject SQL language.

TRLE
TRLE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Konstantinos Lagoudakis
34 questions

Question 74

Report Export Collapse

Although DDoS attacks are distributed, DoS attacks are more powerful and destructive than DDoS attacks .

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Alex Tzibosnik
42 questions

Question 75

Report Export Collapse

Nmap can only be used to scan a single host, but it cannot be used to scan a large computer network to find out which hosts and services of interest are found

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Felix Morales
44 questions

Question 76

Report Export Collapse

The FireHunter series of sandboxes gives accurate results based on the analysis Real-time detection, blocking and reporting of grayscale ¦Flow volume Effectively avoid the rapid spread of unknown threat attacks and the loss of enterprise core information assets.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Nagarajapandian T
35 questions

Question 77

Report Export Collapse

NIP can scan the uploaded files for viruses to prevent intranet PCs from being infected with viruses.

TRLE
TRLE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Sebasteen Lawrance
49 questions

Question 78

Report Export Collapse

NIP Network Intelligent Protection System can support troubleshooting which of the following options7

ESP card troubleshooting function
ESP card troubleshooting function
Ping and Tracer! Means of detection
Ping and Tracer! Means of detection
View and download diagnostic information
View and download diagnostic information
Channel diagnosis function between NIP and network management software or daily host computer
Channel diagnosis function between NIP and network management software or daily host computer
Suggested answer: A, B, C, D
asked 18/09/2024
Kevin Collins
36 questions

Question 79

Report Export Collapse

DAS (Direct Attach STorage) is a storage method that connects directly to the host server Each host server has its own storage device o features about DA5 Which of the following options is incorrectly described?

DAS has the advantages of high bandwidth and low latency
DAS has the advantages of high bandwidth and low latency
DAS does not support file sharing with heterogeneous operating systems
DAS does not support file sharing with heterogeneous operating systems
DAS is usually used in a single network environment with minimal data exchange and low performance requirements
DAS is usually used in a single network environment with minimal data exchange and low performance requirements
DAS is a type of block storage
DAS is a type of block storage
Suggested answer: A
asked 18/09/2024
Yuri Shpovlov
46 questions

Question 80

Report Export Collapse

About Huawei's firewall defense technology against SYN Flood Which of the following options is correctly described?

The limiting method of limiting the number of TCP half-open connections can prevent SYN Flood political attacks
The limiting method of limiting the number of TCP half-open connections can prevent SYN Flood political attacks
Through SYN Cookie technology, SYN Flood can be prevented
Through SYN Cookie technology, SYN Flood can be prevented
By purchasing inter-domain security policies, SYN Flood attacks can be prevented
By purchasing inter-domain security policies, SYN Flood attacks can be prevented
The TCP new connection rate limiting method protects against SYN Flood attacks
The TCP new connection rate limiting method protects against SYN Flood attacks
Suggested answer: A, D
asked 18/09/2024
Sérgio Filipe Soares
47 questions
Total 276 questions
Go to page: of 28
Search

Related questions