New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Huawei H12-724 Practice Exam with Questions & Answers | Set: 5

Questions 41

In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?

Options:
A.

technology

B.

Process

C.

organization

D.

plan

Huawei H12-724 Premium Access
Questions 42

Which patches does Policy Center support to management?(Choose 3 answers)

Options:
A.

Microsoft Windows operating system patches

B.

Microsoft SQL Windows database patch

C.

Microsoft Internet Explorer patches

D.

android system patches

Questions 43

The IPS function of Huawei USG6000 supports two response methods: blocking and alarming.

Options:
A.

True

B.

False

Questions 44

Regarding the processing process of file overwhelming, which of the following statements is correct?

Options:
A.

The file filtering module will compare the application type, file type, and transmission direction of the file identified by the previous module with the file filtering rules configured by the administrator.

Then the lookup table performs matching from top to bottom.

B.

If all the parameters of Wenzhu can match all file filtering rules, then the module will execute the action of this file filtering rule.

C.

There are two types of actions: warning and blocking.

D.

If the file type is a compressed file, then after the file filtering check, the female file will be sent to the file decompression module for decompression and decompression.

Press out the original file. If the decompression fails, the file will not be re-filed.

Questions 45

Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.

Options:
A.

True

B.

False

Questions 46

Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?

Options:
A.

Check for prohibited software licenses and sub-licensed software

B.

Check for prohibited software

C.

Check for prohibited software and software that must be installed

D.

Check the software that must be installed

Questions 47

Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

Options:
A.

Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.

B.

Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.

C.

With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.

D.

Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

Questions 48

Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.

Options:
A.

MAC authentication does not require users to install any client software.

B.

The user name format used by MAC authentication is only one of MAC address user name format.

C.

MAC authentication actually uses 802 1X authentication method.

D.

MAC bypass authentication solves the situation of both 802.1x client authentication and MAC authentication in the same network environment.

Questions 49

Content filtering is a security mechanism for filtering the content of files or applications through Huawei USCG00 products. Focus on the flow through deep recognition

Contains content, the device can block or alert traffic containing specific keywords.

Options:
A.

True

B.

False

Questions 50

Which of the following cybersecurity threats exist only in WLAN In the network?

Options:
A.

Brute force

B.

Crowd attack

C.

DoS Denial of service attack

D.

Weak IV attack