ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

To implement private network user A to access the Internet network after user B That is, which of the following source NAT modes can be configured on the exit firewall to be actively accessed by other users in the Internet network?

asy-IP
asy-IP
NAT No-PAT
NAT No-PAT
Port triples NAT
Port triples NAT
Mouth NAPT
Mouth NAPT
Suggested answer: C
asked 18/09/2024
Jeffrey Agnitsch
47 questions

Question 102

Report Export Collapse

The HUAWEI CLOUD Dedicated HSM service can be used to handle operations such as encryption and decryption, signing, signature verification, key generation, and key security storage. After the user purchases the service, the provider has full control over the generation, storage and access authorization of the key.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Alexandra Peralta Reyes
51 questions

Question 103

Report Export Collapse

After you deploy HUAWEI CLOUD ANTI-DDoS Pro or Anti-DDoS Premium (DDoS Pro) or Anti-DDoS Pro, whether or not a DDoS attack occurs All access traffic is sent directly to the origin server IPo

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Kishen Morar
51 questions

Question 104

Report Export Collapse

Which services in HUAWEI CLOUD solutions can data encryption be applied?

Cloud host security
Cloud host security
Situational awareness services
Situational awareness services
Database security
Database security
Vulnerability scanning service
Vulnerability scanning service
Suggested answer: A, C
asked 18/09/2024
Nika Longley
45 questions

Question 105

Report Export Collapse

Which of the following options is primarily detected by Threat Detection Services (MTD)?

CTS full logs
CTS full logs
Unified Authentication Service (IAM) full logs
Unified Authentication Service (IAM) full logs
Full volumes of Cloud Resolution Service (DNS) logs
Full volumes of Cloud Resolution Service (DNS) logs
Security Guard Device Logs
Security Guard Device Logs
Suggested answer: A, B, C
asked 18/09/2024
Troy Borders
39 questions

Question 106

Report Export Collapse

Which data security is the purpose of data watermark traceability?

Collection security
Collection security
Transport security
Transport security
Storage security
Storage security
Exchange security
Exchange security
Suggested answer: A, C
asked 18/09/2024
justin staley
39 questions

Question 107

Report Export Collapse

Which of the following options is a virtual firewall use case?

Multi-tenant app environment Enable the virtual firewall to implement an independent port for administrative privileges
Multi-tenant app environment Enable the virtual firewall to implement an independent port for administrative privileges
Network traffic isolation between VMs is not possible
Network traffic isolation between VMs is not possible
VPN group and network environment Enable the virtual firewall for forward isolation
VPN group and network environment Enable the virtual firewall for forward isolation
Isolation of different security areas of the campus network
Isolation of different security areas of the campus network
Suggested answer: A, B, C
asked 18/09/2024
Bahman Talachian
31 questions

Question 108

Report Export Collapse

Each element of the audit policy can be flexibly configured, which is convenient for users to classify, classify audit and response, so how many elements the audit strategy includes

3
3
1
1
2
2
4
4
Suggested answer: D
asked 18/09/2024
S Tharakanparampil
44 questions

Question 109

Report Export Collapse

HiSec Insight's detection of unknown files relies primarily on sandbox detection.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Padmanabhan Kudiarasu
54 questions

Question 110

Report Export Collapse

Which of the following are important to the corporate network?

Prevent DOS attacks by hackers
Prevent DOS attacks by hackers
Provide security
Provide security
System stability
System stability
Network serviceability
Network serviceability
Suggested answer: C, D
asked 18/09/2024
Jennifer Leon
47 questions
Total 276 questions
Go to page: of 28

Related questions