ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

The intensity of a system security threat is only related to the vulnerability of the system, and a wellprotected system is basically immune to attack.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
monet washington
42 questions

Question 112

Report Export Collapse

in the architecture of software-defined security Which of the following feature descriptions is correct?

Security resources that can be pooled with features Security functions can be divided and combined, and elastically scalable
Security resources that can be pooled with features Security functions can be divided and combined, and elastically scalable
The functional interface should provide northbound API interfaces to meet the requirements of flexible service configuration
The functional interface should provide northbound API interfaces to meet the requirements of flexible service configuration
The security resource pool that carries the security business function can be a hardware resource pool or a software resource pool
The security resource pool that carries the security business function can be a hardware resource pool or a software resource pool
Need to provide rich security functions to meet the needs of the business
Need to provide rich security functions to meet the needs of the business
Suggested answer: A, B, C, D
asked 18/09/2024
Bonnie Lau
37 questions

Question 113

Report Export Collapse

Regarding ECA probe carrier entities, which of the following cannot be ECA probe carrier entities?

S switch
S switch
firewall
firewall
CE switch
CE switch
HiSec Insight flow probe
HiSec Insight flow probe
Suggested answer: D
asked 18/09/2024
David Washington
35 questions

Question 114

Report Export Collapse

HiSec Insight's detection principle for XSS attacks is based on IPs signature libraries, such as detecting JS code features (script, alert), etC. o

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Alexander Ferrer
55 questions

Question 115

Report Export Collapse

When using server authentication Before visiting the business, the visitor first logs in through the client or potal authentication page The firewall then proactively obtains the user's login information (including the username and IP address used by the visitor) from the server (single selection).

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
doaa elshazly
52 questions

Question 116

Report Export Collapse

Which of the following is not a cybersecurity threat (single selection).

DDOS attacks
DDOS attacks
Phishing attacks
Phishing attacks
IP Spoofing
IP Spoofing
IP address scanning
IP address scanning
Suggested answer: B
asked 18/09/2024
Rosalba Scalera
57 questions

Question 117

Report Export Collapse

Which of the following belong to the development of information security? Extravagant selection)

Information assurance stage
Information assurance stage
Big data security stage
Big data security stage
Artificial intelligence security stage
Artificial intelligence security stage
Communication confidentiality stage
Communication confidentiality stage
Suggested answer: A, D
asked 18/09/2024
Jack de Cort
32 questions

Question 118

Report Export Collapse

Which of the following can be used as a Huawei IPS device to determine intrusion behavior? (single selection).

Session table
Session table
signature
signature
Routing table
Routing table
IP address
IP address
Suggested answer: B
asked 18/09/2024
A R
41 questions

Question 119

Report Export Collapse

Which of the following information cannot be scanned by the nmap tool? (single selection).

Operating system version
Operating system version
Port
Port
Services
Services
System vulnerabilities
System vulnerabilities
Suggested answer: D
asked 18/09/2024
Juan Jose Montero Caletrio
37 questions

Question 120

Report Export Collapse

Which of the following attacks can be addressed using cybertrapping? (Single selection)

DDos
DDos
Malformed message attack
Malformed message attack
TCP port scanning
TCP port scanning
Oversized ICMP packet attack
Oversized ICMP packet attack
Suggested answer: C
asked 18/09/2024
Donald Bell
33 questions
Total 276 questions
Go to page: of 28

Related questions