Huawei H12-724 Exam (page: 1)
Huawei HCIP Security (Fast track) V1.0
Updated on: 28-Jul-2025

Viewing Page 1 of 75

If the user's FTP operation matches the FTP filtering policy, what actions can be performed? (multiple choice)

  1. Block
  2. Declare
  3. Alarm
  4. Execution

Answer(s): A,C



Regarding firewall and IDS, which of the following statements is correct?

  1. The firewall is a bypass device, used for fine-grained detection
  2. IDS is a straight line equipment and cannot be used for in-depth inspection
  3. The firewall cannot detect malicious operations or misoperations by insiders
  4. IDS cannot be linked with firewall

Answer(s): C



Which of the following types of attacks are DDoS attacks?

  1. Single packet attack
  2. Floating child attack
  3. Malformed message attack
  4. Snooping scan attack

Answer(s): B



Part of the reason why the APT attack becomes difficult to defend is that it uses the vulnerabilities to attack. This kind of zero-day hole usually requires flowers A lot of time to research and analyze and produce corresponding defense methods.

  1. True
  2. False

Answer(s): A



The following figure shows the configuration of the URL filtering configuration file. Regarding the configuration, which of the following statements is correct?

  1. The firewall will first check the blacklist entries and then the whitelist entries.
  2. Assuming that the user visits the www.exzample.com website, which belongs to the categories of humanities and social networks at the same time, the user cannot access the website.
  3. The user visits the website www.exzample.com, and when the black and white list is not hit, the next step is to query the predefined URL category entry.
  4. The default action means that all websites are allowed to visit. So the configuration is wrong here.

Answer(s): B



Viewing Page 1 of 75



Share your comments for Huawei H12-724 exam with other users:

Shariq 7/28/2023 8:00:00 AM

how do i get the h12-724 dumps
Anonymous