Free H12-724 Exam Braindumps (page: 38)

Page 37 of 92

Which of the following options does not belong to the security risk of the application layer of the TCP/IP protocol stack?

  1. Virus
  2. Buffer overflow
  3. System vulnerabilities
  4. Port scan

Answer(s): D



Intrusion detection is a network security technology used to detect any damage or attempt to damage the confidentiality, integrity or availability of the system.
Which of the following.
What is the content of the intrusion detection knowledge base?

  1. Complete virus sample
  2. Complete Trojan Horse
  3. Specific behavior patterns
  4. Security Policy

Answer(s): C



The administrator has configured file filtering to prohibit internal employees from uploading development files, but internal employees can still upload development files.
Which of the following is not allowed Can the reason?

  1. The file filtering configuration file is not referenced in the security policy
  2. File filtering configuration file is incorrect
  3. License is not activated.
  4. The action configuration of the file extension does not match is incorrect

Answer(s): D



Regarding the Anti-DDoS cloud cleaning solution; which of the following statements is wrong?

  1. Ordinary attacks will usually be cleaned locally first.
  2. If there is a large traffic attack on the network, send it to the cloud cleaning center to share the cleaning pressure.
  3. Since the Cloud Cleaning Alliance will direct larger attack flows to the cloud for cleaning, it will cause network congestion.
  4. The closer to the attacked self-labeled cloud cleaning service, the priority will be called.

Answer(s): C






Post your Comments and Discuss Huawei H12-724 exam with other Community members:

H12-724 Discussions & Posts