ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











In 2017, hackers unveiled a slew of cyberattack tools, including Eternal Blue tools. Then • Eternal Blue exploits the vulnerability of which of the following options of the Windows system can obtain the maximum relaxation limit of the system.

A.
UMCODE vulnerability
A.
UMCODE vulnerability
Answers
B.
Printer vulnerability
B.
Printer vulnerability
Answers
C.
Frontpage server extension vulnerability
C.
Frontpage server extension vulnerability
Answers
D.
SMB vulnerabilities
D.
SMB vulnerabilities
Answers
Suggested answer: C

Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

According to the type and purpose of the bait, it can be divided into log bait, certificate bait, account bait, email bait, project code bait, etC.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Nmap is a network security tool for network discovery and security auditing, so which of the following options does it fall into ?

A.
Virus scan
A.
Virus scan
Answers
B.
App scanning
B.
App scanning
Answers
C.
Vulnerability scanning
C.
Vulnerability scanning
Answers
D.
Port scanning
D.
Port scanning
Answers
Suggested answer: D

The antivirus system identifies the target of attack based on the characteristics of the detected object The APT defense system identifies the attack object based on the behavior of the detected object.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?

A.
Destination IP address
A.
Destination IP address
Answers
B.
Port number
B.
Port number
Answers
C.
Feature library
C.
Feature library
Answers
D.
Source IP address
D.
Source IP address
Answers
Suggested answer: C

SA-SDB and SAEngine are used to identify the traffic in the network, and the device analyzes the network traffic according to the identification results, and can generate traffic reports or carry out corresponding control strategies for traffic, such as release, throttling and redirection.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

In the enterprise network, the source IP address and the destination IP address need to be translated at the same time, and there is no fixed mapping relationship before and after the destination IP address translation The following USC firewall features which combined can buy cash out less demand

A.
Static mapping
A.
Static mapping
Answers
B.
Static destination NAT
B.
Static destination NAT
Answers
C.
Dynamic destination NAT
C.
Dynamic destination NAT
Answers
D.
Source NAT
D.
Source NAT
Answers
Suggested answer: B, D

The following suggestions for deploying heartbeats between firewalls with hot standby on both devices, which are correct?

A.
It is recommended that the heartbeat port be connected directly with a network cable or optical fiber
A.
It is recommended that the heartbeat port be connected directly with a network cable or optical fiber
Answers
B.
We recommend that you plan a special interface as a heartbeat port and do not direct service packets to the heartbeat connection and forward
B.
We recommend that you plan a special interface as a heartbeat port and do not direct service packets to the heartbeat connection and forward
Answers
C.
It is recommended to configure at least 2 heartbeat ports, one as the main use One as a backup
C.
It is recommended to configure at least 2 heartbeat ports, one as the main use One as a backup
Answers
D.
It is proposed to use a cross-board Eth-trunk port as a heartbeat port between the two firewalls.
D.
It is proposed to use a cross-board Eth-trunk port as a heartbeat port between the two firewalls.
Answers
Suggested answer: A, B, C, D

Which of the following parameters is included in the DNS request routing method in the firewall DNS transparent proxy?

A.
global traffic steering strategy
A.
global traffic steering strategy
Answers
B.
Normal static or dynamic routing routing is selected
B.
Normal static or dynamic routing routing is selected
Answers
C.
Policy routing routing is routed
C.
Policy routing routing is routed
Answers
D.
The intelligent traffic steering mode configured by the DNS transparent proxy itself
D.
The intelligent traffic steering mode configured by the DNS transparent proxy itself
Answers
Suggested answer: C, D
Total 276 questions
Go to page: of 28