Huawei Related Exams
H12-725_V4.0 Exam
Before configuring DDoS attack defense, you must configure different thresholds for defense against different types of attacks. Each threshold can be considered an upper limit for normal network traffic. When the rate of traffic exceeds the pre-configured threshold, the firewall considers it to be attack traffic and takes a corresponding action to defend against it.
Which of the following statements is false about Eth-Trunk?(Select All that Apply)
Which of the following actions can be performed when the firewall identifies file anomalies?(Select All that Apply)