ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











To implement private network user A to access the Internet network after user B That is, which of the following source NAT modes can be configured on the exit firewall to be actively accessed by other users in the Internet network?

A.
asy-IP
A.
asy-IP
Answers
B.
NAT No-PAT
B.
NAT No-PAT
Answers
C.
Port triples NAT
C.
Port triples NAT
Answers
D.
Mouth NAPT
D.
Mouth NAPT
Answers
Suggested answer: C

The HUAWEI CLOUD Dedicated HSM service can be used to handle operations such as encryption and decryption, signing, signature verification, key generation, and key security storage. After the user purchases the service, the provider has full control over the generation, storage and access authorization of the key.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

After you deploy HUAWEI CLOUD ANTI-DDoS Pro or Anti-DDoS Premium (DDoS Pro) or Anti-DDoS Pro, whether or not a DDoS attack occurs All access traffic is sent directly to the origin server IPo

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Which services in HUAWEI CLOUD solutions can data encryption be applied?

A.
Cloud host security
A.
Cloud host security
Answers
B.
Situational awareness services
B.
Situational awareness services
Answers
C.
Database security
C.
Database security
Answers
D.
Vulnerability scanning service
D.
Vulnerability scanning service
Answers
Suggested answer: A, C

Which of the following options is primarily detected by Threat Detection Services (MTD)?

A.
CTS full logs
A.
CTS full logs
Answers
B.
Unified Authentication Service (IAM) full logs
B.
Unified Authentication Service (IAM) full logs
Answers
C.
Full volumes of Cloud Resolution Service (DNS) logs
C.
Full volumes of Cloud Resolution Service (DNS) logs
Answers
D.
Security Guard Device Logs
D.
Security Guard Device Logs
Answers
Suggested answer: A, B, C

Which data security is the purpose of data watermark traceability?

A.
Collection security
A.
Collection security
Answers
B.
Transport security
B.
Transport security
Answers
C.
Storage security
C.
Storage security
Answers
D.
Exchange security
D.
Exchange security
Answers
Suggested answer: A, C

Which of the following options is a virtual firewall use case?

A.
Multi-tenant app environment Enable the virtual firewall to implement an independent port for administrative privileges
A.
Multi-tenant app environment Enable the virtual firewall to implement an independent port for administrative privileges
Answers
B.
Network traffic isolation between VMs is not possible
B.
Network traffic isolation between VMs is not possible
Answers
C.
VPN group and network environment Enable the virtual firewall for forward isolation
C.
VPN group and network environment Enable the virtual firewall for forward isolation
Answers
D.
Isolation of different security areas of the campus network
D.
Isolation of different security areas of the campus network
Answers
Suggested answer: A, B, C

Each element of the audit policy can be flexibly configured, which is convenient for users to classify, classify audit and response, so how many elements the audit strategy includes

A.
3
A.
3
Answers
B.
1
B.
1
Answers
C.
2
C.
2
Answers
D.
4
D.
4
Answers
Suggested answer: D

HiSec Insight's detection of unknown files relies primarily on sandbox detection.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which of the following are important to the corporate network?

A.
Prevent DOS attacks by hackers
A.
Prevent DOS attacks by hackers
Answers
B.
Provide security
B.
Provide security
Answers
C.
System stability
C.
System stability
Answers
D.
Network serviceability
D.
Network serviceability
Answers
Suggested answer: C, D
Total 276 questions
Go to page: of 28