Huawei H12-724 Exam (page: 15)
Huawei HCIP Security (Fast track) V1.0
Updated on: 15-Feb-2026

Viewing Page 15 of 75

Viruses can damage computer systems. v Change and damage business data: spyware collects, uses, and disperses sensitive information of corporate employees. These malicious pastoral software seriously disturb the normal business of the enterprise. Desktop anti-disease software can solve the problem of central virus and indirect software from the overall situation.

  1. True
  2. False

Answer(s): B



When configuring the URL filtering configuration file, www.bt.com is configured in the URL blacklist- item: At the same time, set it in the custom URL category. A URL is set as bt.com, and the action of customizing URL classification is a warning. Regarding the

above configuration, which of the following statements are correct? (More select)

  1. Users can visit www.videobt.com website.
  2. The user can visit the www.bt.com website, but the administrator will receive a warning message.
  3. User cannot access all the sites ending with bt com.

  4. When users visit www.bt. com, they will be blocked.

Answer(s): A,D



Regarding the statement of the mail protocol, which of the following is correct? (multiple choice)

  1. Using POP3, the client software will download all unread mails to the computer, and the mail server will delete the mails.
  2. Use JIMAP; the client software will download all unread mails to the computer, and the mail server will delete the mails.
  3. With IMAP, users can directly operate on the mail on the server, without downloading all the mails locally to perform various operations.
  4. Using POP3, users can directly operate on the mail on the server without sending all mails to the local to perform various operations.

Answer(s): A,C



Which of the following are typical intrusions? "Multiple choice)

  1. Computer is infected by U disk virus
  2. Abnormal power interruption in the computer room
  3. Tampering with Web pages
  4. Copy/view sensitive data

Answer(s): C,D



In the Huawei USG6000 product, after creating or modifying the security configuration file, the configuration content will not take effect immediately: you need to click the "Prompt" in the upper right corner of the interface.
"Hand in" to activate.

  1. True
  2. False

Answer(s): A



Viewing Page 15 of 75



Share your comments for Huawei H12-724 exam with other users:

Shariq 7/28/2023 8:00:00 AM

how do i get the h12-724 dumps
Anonymous