ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

When personal privacy information is violated or leaked How to deal with the adoption of self-help measures?

Require the infringer to stop the infringement.
Require the infringer to stop the infringement.
Obtain privacy information of infringers and warn them.
Obtain privacy information of infringers and warn them.
Call the police and ask the public security authorities to deal with it.
Call the police and ask the public security authorities to deal with it.
Filing a lawsuit in the people's court.
Filing a lawsuit in the people's court.
Suggested answer: A, C, D
asked 18/09/2024
Navaid Ali
39 questions

Question 2

Report Export Collapse

According to the requirements of Graded Protection 2.0, the scope of security audits should cover not only every operating system user on the server, but also which of the following

Database user
Database user
Monitor users
Monitor users
Configure the user
Configure the user
Non-admin users
Non-admin users
Suggested answer: A
asked 18/09/2024
Ben Appelman
36 questions

Question 3

Report Export Collapse

Databases often store important information about the enterprise, and hackers try to gain profits by destroying servers and databases Therefore. Securing databases is becoming increasingly important.

Which of the following are common database political methods?

ASQL injection
ASQL injection
Privilege elevation
Privilege elevation
Eliminate unpatched database vulnerabilities
Eliminate unpatched database vulnerabilities
Steal backed-up (unencrypted) tapes
Steal backed-up (unencrypted) tapes
Brute force weak password or default username and password
Brute force weak password or default username and password
Suggested answer: A, B, C, D, E
asked 18/09/2024
Franco Santos
38 questions

Question 4

Report Export Collapse

JDBC is a mechanism for Java applications to talk to various different databases, and ODEC, similar to JDEC, is also an important database access technology.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Edmond Chui
35 questions

Question 5

Report Export Collapse

In the Cloudabric scenario, which of the following ways is the firewall deployed?

One machine deployment
One machine deployment
Primary/standby dual-machine images
Primary/standby dual-machine images
Dual machine load sharing
Dual machine load sharing
Hot standby for both active and standby machines
Hot standby for both active and standby machines
Suggested answer: D
asked 18/09/2024
Andre van Mierlo
37 questions

Question 6

Report Export Collapse

Which of the following options is not included in the data theft phase of HiSec Insight?

Ping Tunnel detection
Ping Tunnel detection
DNS Turnel detection
DNS Turnel detection
Traffic base anomaly detection
Traffic base anomaly detection
Web anomaly detection
Web anomaly detection
Suggested answer: A, B, D
asked 18/09/2024
Christodoulos Chiras
29 questions

Question 7

Report Export Collapse

When Hisec Insight is linked with terminals, it is mainly linked with the EDR of third-party vendors with cooperative relationships.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Rumen Zazyov
33 questions

Question 8

Report Export Collapse

Regarding situational awareness, is the following description correct?

Perception of elements in the environment
Perception of elements in the environment
Rationale for the current situation
Rationale for the current situation
A projection of a longer period of time in the future
A projection of a longer period of time in the future
Perception of elements in a temporal and spatial environment An understanding of their meaning, and a projection of their later state
Perception of elements in a temporal and spatial environment An understanding of their meaning, and a projection of their later state
Suggested answer: D
asked 18/09/2024
Sara Trela
33 questions

Question 9

Report Export Collapse

The main role of the audit system is to audit security events after the fact To provide sufficient evidence, a security audit product must have which of the following features7

Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation
Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation
It can provide fine-grained access control to maximize the security of user resources
It can provide fine-grained access control to maximize the security of user resources
It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account
It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account
It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise
It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise
Suggested answer: D
asked 18/09/2024
paloma giraudo
34 questions

Question 10

Report Export Collapse

On the principle of defense against trapping Which of the following is described as incorrect=

By deceiving network detection activities, fake resources are displayed, so that attackers cannot discover real system information and vulnerabilities
By deceiving network detection activities, fake resources are displayed, so that attackers cannot discover real system information and vulnerabilities
Interact with the attack campaign to confirm the intent and discover the attacker before the breach occurs
Interact with the attack campaign to confirm the intent and discover the attacker before the breach occurs
Trapping systems discover and block attacker attacks
Trapping systems discover and block attacker attacks
Interference Attack Gathering System Information diaphragmatic weakness determination" process, inducing the attacker to expose the intention
Interference Attack Gathering System Information diaphragmatic weakness determination" process, inducing the attacker to expose the intention
Suggested answer: C
asked 18/09/2024
Ryan Lee
27 questions
Total 276 questions
Go to page: of 28

Related questions