Free H12-724 Exam Braindumps (page: 37)

Page 36 of 92

When a data file hits the whitelist of the firewall's anti-virus module, the firewall will no longer perform virus detection on the file.

  1. True
  2. False

Answer(s): A



What content can be filtered by the content filtering technology of Huawei USG6000 products?

  1. File content filtering
  2. Voice content filtering
  3. Apply content filtering..
  4. The source of the video content

Answer(s): A,C



If you combine security defense with big data technology, which of the following statements are correct? (multiple choice)

  1. In the learning process, you should start from collecting samples, analyze their characteristics and then perform machine learning.
  2. Machine learning only counts a large number of samples, which is convenient for security administrators to view.
  3. In the detection process, the characteristics of unknown samples need to be extracted and calculated to provide samples for subsequent static comparisons.
  4. Security source data can come from many places, including data streams, messages, threat events, logs, etc.

Answer(s): A,C,D



Use BGP protocol to achieve diversion, the configuration command is as follows [sysname] route-policy 1 permit node 1
[sysname-route-policy] apply community no-advertise
[sysname-route-policy] quit
[sysname]bgp100
[sysname-bgp] peer
[sysname-bgp] import-route unr
[sysname- bgpl ipv4-family unicast
[sysname-bgp-af-ipv4] peer 7.7.1.2 route-policy 1 export [sysname-bgp-af-ipv4] peer 7.7. 1.2 advertise community [sysname-bgp-af-ipv4] quit
[sysname-bgp]quit
Which of the following options is correct for the description of BGP diversion configuration? (multiple choice)

  1. Use BGP to publish UNR routes to achieve dynamic diversion.
  2. After receiving the UNR route, the peer neighbor will not send it to any BGP neighbor.
  3. You also need to configure the firewall ddos bgp-next-hop fib-filter command to implement back- injection.
  4. The management center does not need to configure protection objects.
    When an attack is discovered, it automatically issues a traffic diversion task.

Answer(s): A,B






Post your Comments and Discuss Huawei H12-724 exam with other Community members:

H12-724 Discussions & Posts