ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

In 2017, hackers unveiled a slew of cyberattack tools, including Eternal Blue tools. Then β€’ Eternal Blue exploits the vulnerability of which of the following options of the Windows system can obtain the maximum relaxation limit of the system.

UMCODE vulnerability
UMCODE vulnerability
Printer vulnerability
Printer vulnerability
Frontpage server extension vulnerability
Frontpage server extension vulnerability
SMB vulnerabilities
SMB vulnerabilities
Suggested answer: C
asked 18/09/2024
Tebogo Maphafo
40 questions

Question 82

Report Export Collapse

Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Carole Pie
49 questions

Question 83

Report Export Collapse

According to the type and purpose of the bait, it can be divided into log bait, certificate bait, account bait, email bait, project code bait, etC.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
edoardo peraino
28 questions

Question 84

Report Export Collapse

Nmap is a network security tool for network discovery and security auditing, so which of the following options does it fall into ?

Virus scan
Virus scan
App scanning
App scanning
Vulnerability scanning
Vulnerability scanning
Port scanning
Port scanning
Suggested answer: D
asked 18/09/2024
Fai Malali
41 questions

Question 85

Report Export Collapse

The antivirus system identifies the target of attack based on the characteristics of the detected object The APT defense system identifies the attack object based on the behavior of the detected object.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Tobi Space
47 questions

Question 86

Report Export Collapse

IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?

Destination IP address
Destination IP address
Port number
Port number
Feature library
Feature library
Source IP address
Source IP address
Suggested answer: C
asked 18/09/2024
Asad yaseen
44 questions

Question 87

Report Export Collapse

SA-SDB and SAEngine are used to identify the traffic in the network, and the device analyzes the network traffic according to the identification results, and can generate traffic reports or carry out corresponding control strategies for traffic, such as release, throttling and redirection.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Joe Pardee
58 questions

Question 88

Report Export Collapse

In the enterprise network, the source IP address and the destination IP address need to be translated at the same time, and there is no fixed mapping relationship before and after the destination IP address translation The following USC firewall features which combined can buy cash out less demand

Static mapping
Static mapping
Static destination NAT
Static destination NAT
Dynamic destination NAT
Dynamic destination NAT
Source NAT
Source NAT
Suggested answer: B, D
asked 18/09/2024
Lin Sun
42 questions

Question 89

Report Export Collapse

The following suggestions for deploying heartbeats between firewalls with hot standby on both devices, which are correct?

It is recommended that the heartbeat port be connected directly with a network cable or optical fiber
It is recommended that the heartbeat port be connected directly with a network cable or optical fiber
We recommend that you plan a special interface as a heartbeat port and do not direct service packets to the heartbeat connection and forward
We recommend that you plan a special interface as a heartbeat port and do not direct service packets to the heartbeat connection and forward
It is recommended to configure at least 2 heartbeat ports, one as the main use One as a backup
It is recommended to configure at least 2 heartbeat ports, one as the main use One as a backup
It is proposed to use a cross-board Eth-trunk port as a heartbeat port between the two firewalls.
It is proposed to use a cross-board Eth-trunk port as a heartbeat port between the two firewalls.
Suggested answer: A, B, C, D
asked 18/09/2024
Albert Hidalgo Bassons
49 questions

Question 90

Report Export Collapse

Which of the following parameters is included in the DNS request routing method in the firewall DNS transparent proxy?

global traffic steering strategy
global traffic steering strategy
Normal static or dynamic routing routing is selected
Normal static or dynamic routing routing is selected
Policy routing routing is routed
Policy routing routing is routed
The intelligent traffic steering mode configured by the DNS transparent proxy itself
The intelligent traffic steering mode configured by the DNS transparent proxy itself
Suggested answer: C, D
asked 18/09/2024
Nicole Stevens
51 questions
Total 276 questions
Go to page: of 28
Search

Related questions