ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











Which of the following options are the main dangers of computer Trojans?

A.
User files are corrupted
A.
User files are corrupted
Answers
B.
Illegal remote control of a computer
B.
Illegal remote control of a computer
Answers
C.
Personal accounts, passwords and other information are stolen
C.
Personal accounts, passwords and other information are stolen
Answers
D.
Cause the system to slow down or even freeze
D.
Cause the system to slow down or even freeze
Answers
Suggested answer: A, B, C, D

When the Abnormal Traffic Inspection & Control System^ defense strategy of the Abnormal Traffic Monitoring System ATIC selects the anti-uninstall action, it utilizes the status code (targeted) for which of the following options GET request method redirection) to prove the true identity of the client?

A.
300
A.
300
Answers
B.
301
B.
301
Answers
C.
303
C.
303
Answers
D.
302
D.
302
Answers
Suggested answer: D

Whitelisting may not properly handle complex obfuscation, which could allow attackers to subvert filters and potentially inject SQL language.

A.
TRLE
A.
TRLE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Although DDoS attacks are distributed, DoS attacks are more powerful and destructive than DDoS attacks .

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Nmap can only be used to scan a single host, but it cannot be used to scan a large computer network to find out which hosts and services of interest are found

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The FireHunter series of sandboxes gives accurate results based on the analysis Real-time detection, blocking and reporting of grayscale ¦Flow volume Effectively avoid the rapid spread of unknown threat attacks and the loss of enterprise core information assets.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

NIP can scan the uploaded files for viruses to prevent intranet PCs from being infected with viruses.

A.
TRLE
A.
TRLE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

NIP Network Intelligent Protection System can support troubleshooting which of the following options7

A.
ESP card troubleshooting function
A.
ESP card troubleshooting function
Answers
B.
Ping and Tracer! Means of detection
B.
Ping and Tracer! Means of detection
Answers
C.
View and download diagnostic information
C.
View and download diagnostic information
Answers
D.
Channel diagnosis function between NIP and network management software or daily host computer
D.
Channel diagnosis function between NIP and network management software or daily host computer
Answers
Suggested answer: A, B, C, D

DAS (Direct Attach STorage) is a storage method that connects directly to the host server Each host server has its own storage device o features about DA5 Which of the following options is incorrectly described?

A.
DAS has the advantages of high bandwidth and low latency
A.
DAS has the advantages of high bandwidth and low latency
Answers
B.
DAS does not support file sharing with heterogeneous operating systems
B.
DAS does not support file sharing with heterogeneous operating systems
Answers
C.
DAS is usually used in a single network environment with minimal data exchange and low performance requirements
C.
DAS is usually used in a single network environment with minimal data exchange and low performance requirements
Answers
D.
DAS is a type of block storage
D.
DAS is a type of block storage
Answers
Suggested answer: A

About Huawei's firewall defense technology against SYN Flood Which of the following options is correctly described?

A.
The limiting method of limiting the number of TCP half-open connections can prevent SYN Flood political attacks
A.
The limiting method of limiting the number of TCP half-open connections can prevent SYN Flood political attacks
Answers
B.
Through SYN Cookie technology, SYN Flood can be prevented
B.
Through SYN Cookie technology, SYN Flood can be prevented
Answers
C.
By purchasing inter-domain security policies, SYN Flood attacks can be prevented
C.
By purchasing inter-domain security policies, SYN Flood attacks can be prevented
Answers
D.
The TCP new connection rate limiting method protects against SYN Flood attacks
D.
The TCP new connection rate limiting method protects against SYN Flood attacks
Answers
Suggested answer: A, D
Total 276 questions
Go to page: of 28