ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

In 2017, hackers unveiled a slew of cyberattack tools, including Eternal Blue tools. Then β€’ Eternal Blue exploits the vulnerability of which of the following options of the Windows system can obtain the maximum relaxation limit of the system.

Become a Premium Member for full access
  Unlock Premium Member

Question 82

Report Export Collapse

Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.

Become a Premium Member for full access
  Unlock Premium Member

Question 83

Report Export Collapse

According to the type and purpose of the bait, it can be divided into log bait, certificate bait, account bait, email bait, project code bait, etC.

Become a Premium Member for full access
  Unlock Premium Member

Question 84

Report Export Collapse

Nmap is a network security tool for network discovery and security auditing, so which of the following options does it fall into ?

Become a Premium Member for full access
  Unlock Premium Member

Question 85

Report Export Collapse

The antivirus system identifies the target of attack based on the characteristics of the detected object The APT defense system identifies the attack object based on the behavior of the detected object.

Become a Premium Member for full access
  Unlock Premium Member

Question 86

Report Export Collapse

IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?

Become a Premium Member for full access
  Unlock Premium Member

Question 87

Report Export Collapse

SA-SDB and SAEngine are used to identify the traffic in the network, and the device analyzes the network traffic according to the identification results, and can generate traffic reports or carry out corresponding control strategies for traffic, such as release, throttling and redirection.

Become a Premium Member for full access
  Unlock Premium Member

Question 88

Report Export Collapse

In the enterprise network, the source IP address and the destination IP address need to be translated at the same time, and there is no fixed mapping relationship before and after the destination IP address translation The following USC firewall features which combined can buy cash out less demand

Become a Premium Member for full access
  Unlock Premium Member

Question 89

Report Export Collapse

The following suggestions for deploying heartbeats between firewalls with hot standby on both devices, which are correct?

Become a Premium Member for full access
  Unlock Premium Member

Question 90

Report Export Collapse

Which of the following parameters is included in the DNS request routing method in the firewall DNS transparent proxy?

Become a Premium Member for full access
  Unlock Premium Member
Total 276 questions
Go to page: of 28
Search

Related questions