ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers

Question list
Search
Search

Related questions











When personal privacy information is violated or leaked How to deal with the adoption of self-help measures?

A.
Require the infringer to stop the infringement.
A.
Require the infringer to stop the infringement.
Answers
B.
Obtain privacy information of infringers and warn them.
B.
Obtain privacy information of infringers and warn them.
Answers
C.
Call the police and ask the public security authorities to deal with it.
C.
Call the police and ask the public security authorities to deal with it.
Answers
D.
Filing a lawsuit in the people's court.
D.
Filing a lawsuit in the people's court.
Answers
Suggested answer: A, C, D

According to the requirements of Graded Protection 2.0, the scope of security audits should cover not only every operating system user on the server, but also which of the following

A.
Database user
A.
Database user
Answers
B.
Monitor users
B.
Monitor users
Answers
C.
Configure the user
C.
Configure the user
Answers
D.
Non-admin users
D.
Non-admin users
Answers
Suggested answer: A

Databases often store important information about the enterprise, and hackers try to gain profits by destroying servers and databases Therefore. Securing databases is becoming increasingly important.

Which of the following are common database political methods?

A.
ASQL injection
A.
ASQL injection
Answers
B.
Privilege elevation
B.
Privilege elevation
Answers
C.
Eliminate unpatched database vulnerabilities
C.
Eliminate unpatched database vulnerabilities
Answers
D.
Steal backed-up (unencrypted) tapes
D.
Steal backed-up (unencrypted) tapes
Answers
E.
Brute force weak password or default username and password
E.
Brute force weak password or default username and password
Answers
Suggested answer: A, B, C, D, E

JDBC is a mechanism for Java applications to talk to various different databases, and ODEC, similar to JDEC, is also an important database access technology.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

In the Cloudabric scenario, which of the following ways is the firewall deployed?

A.
One machine deployment
A.
One machine deployment
Answers
B.
Primary/standby dual-machine images
B.
Primary/standby dual-machine images
Answers
C.
Dual machine load sharing
C.
Dual machine load sharing
Answers
D.
Hot standby for both active and standby machines
D.
Hot standby for both active and standby machines
Answers
Suggested answer: D

Which of the following options is not included in the data theft phase of HiSec Insight?

A.
Ping Tunnel detection
A.
Ping Tunnel detection
Answers
B.
DNS Turnel detection
B.
DNS Turnel detection
Answers
C.
Traffic base anomaly detection
C.
Traffic base anomaly detection
Answers
D.
Web anomaly detection
D.
Web anomaly detection
Answers
Suggested answer: A, B, D

When Hisec Insight is linked with terminals, it is mainly linked with the EDR of third-party vendors with cooperative relationships.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Regarding situational awareness, is the following description correct?

A.
Perception of elements in the environment
A.
Perception of elements in the environment
Answers
B.
Rationale for the current situation
B.
Rationale for the current situation
Answers
C.
A projection of a longer period of time in the future
C.
A projection of a longer period of time in the future
Answers
D.
Perception of elements in a temporal and spatial environment An understanding of their meaning, and a projection of their later state
D.
Perception of elements in a temporal and spatial environment An understanding of their meaning, and a projection of their later state
Answers
Suggested answer: D

The main role of the audit system is to audit security events after the fact To provide sufficient evidence, a security audit product must have which of the following features7

A.
Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation
A.
Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation
Answers
B.
It can provide fine-grained access control to maximize the security of user resources
B.
It can provide fine-grained access control to maximize the security of user resources
Answers
C.
It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account
C.
It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account
Answers
D.
It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise
D.
It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise
Answers
Suggested answer: D

On the principle of defense against trapping Which of the following is described as incorrect=

A.
By deceiving network detection activities, fake resources are displayed, so that attackers cannot discover real system information and vulnerabilities
A.
By deceiving network detection activities, fake resources are displayed, so that attackers cannot discover real system information and vulnerabilities
Answers
B.
Interact with the attack campaign to confirm the intent and discover the attacker before the breach occurs
B.
Interact with the attack campaign to confirm the intent and discover the attacker before the breach occurs
Answers
C.
Trapping systems discover and block attacker attacks
C.
Trapping systems discover and block attacker attacks
Answers
D.
Interference Attack Gathering System Information diaphragmatic weakness determination" process, inducing the attacker to expose the intention
D.
Interference Attack Gathering System Information diaphragmatic weakness determination" process, inducing the attacker to expose the intention
Answers
Suggested answer: C
Total 276 questions
Go to page: of 28