Free H12-724 Exam Braindumps (page: 35)

Page 34 of 92

The following figure is a schematic diagram of the detection file of the firewall and the sandbox system linkage.



The Web reputation function is enabled on the firewall, and website A is set as a trusted website and website B is set as a suspicious website.
Which of the following statements is correct

  1. The files obtained by users from website A and website B will be sent to the inspection node for inspection.

  2. When a user visits website B, although the firewall will extract the file and send it to the detection node, the user can still access normally during the detection process Site
  3. After the detection node detects the suspicious file, it not only informs the firewall in the figure of the result, but also informs other network devices connected to it.
  4. Assuming that website A is an unknown website, the administrator cannot detect the traffic file of this website sC

Answer(s): C



Configure the following commands on the Huawei firewall:
[USG] interface G0/0/1

[USG] ip urpf loose allow-defult-route acl 3000
Which of the following options are correct? (multiple choice)

  1. For loose inspection: if the source address of the packet exists in the FB of the firewall: the packet passes the inspection directly
  2. For the case where the default route is configured, but the parameter allow-defult-route is not configured. As long as the source address of the packet is in the FIB table of the firewall If it does not exist, the message will be rejected.
  3. For the situation where the default route is configured and the parameter allow-defult-route is matched at the same time, if the source address of the packet is in the FIB table of the firewall If the packet does not exist in the loose check mode, all packets will pass the URPF check and be forwarded normally.
  4. For the configuration of the default route, and at the same time matching the parameter allow- defult-route, if the source address of the message is in the FIB table of the firewall If it does not exist in the l0e check, the packet cannot pass the URPF check.

Answer(s): A,B,C



With regard to APT attacks, the attacker often lurks for a long time and launches a formal attack on the enterprise at the key point of the incident.
Generally, APT attacks can be summarized into four stages:
1. Collecting Information & Intrusion
2. Long-term lurking & mining
3. Data breach
4. Remote control and penetration
Regarding the order of these four stages, which of the following options is correct?

  1. 2-3-4-1
  2. 1-2-4-3
  3. 1-4-2-3
  4. 2-1-4-3

Answer(s): C



When using the two-way SSL function to decrypt HTTPS packets, the value of the reverse proxy level represents the number of times the packet can be decrypted.

  1. True
  2. False

Answer(s): B






Post your Comments and Discuss Huawei H12-724 exam with other Community members:

H12-724 Discussions & Posts