ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Related questions











The intensity of a system security threat is only related to the vulnerability of the system, and a wellprotected system is basically immune to attack.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

in the architecture of software-defined security Which of the following feature descriptions is correct?

A.
Security resources that can be pooled with features Security functions can be divided and combined, and elastically scalable
A.
Security resources that can be pooled with features Security functions can be divided and combined, and elastically scalable
Answers
B.
The functional interface should provide northbound API interfaces to meet the requirements of flexible service configuration
B.
The functional interface should provide northbound API interfaces to meet the requirements of flexible service configuration
Answers
C.
The security resource pool that carries the security business function can be a hardware resource pool or a software resource pool
C.
The security resource pool that carries the security business function can be a hardware resource pool or a software resource pool
Answers
D.
Need to provide rich security functions to meet the needs of the business
D.
Need to provide rich security functions to meet the needs of the business
Answers
Suggested answer: A, B, C, D

Regarding ECA probe carrier entities, which of the following cannot be ECA probe carrier entities?

A.
S switch
A.
S switch
Answers
B.
firewall
B.
firewall
Answers
C.
CE switch
C.
CE switch
Answers
D.
HiSec Insight flow probe
D.
HiSec Insight flow probe
Answers
Suggested answer: D

HiSec Insight's detection principle for XSS attacks is based on IPs signature libraries, such as detecting JS code features (script, alert), etC. o

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

When using server authentication Before visiting the business, the visitor first logs in through the client or potal authentication page The firewall then proactively obtains the user's login information (including the username and IP address used by the visitor) from the server (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Which of the following is not a cybersecurity threat (single selection).

A.
DDOS attacks
A.
DDOS attacks
Answers
B.
Phishing attacks
B.
Phishing attacks
Answers
C.
IP Spoofing
C.
IP Spoofing
Answers
D.
IP address scanning
D.
IP address scanning
Answers
Suggested answer: B

Which of the following belong to the development of information security? Extravagant selection)

A.
Information assurance stage
A.
Information assurance stage
Answers
B.
Big data security stage
B.
Big data security stage
Answers
C.
Artificial intelligence security stage
C.
Artificial intelligence security stage
Answers
D.
Communication confidentiality stage
D.
Communication confidentiality stage
Answers
Suggested answer: A, D

Which of the following can be used as a Huawei IPS device to determine intrusion behavior? (single selection).

A.
Session table
A.
Session table
Answers
B.
signature
B.
signature
Answers
C.
Routing table
C.
Routing table
Answers
D.
IP address
D.
IP address
Answers
Suggested answer: B

Which of the following information cannot be scanned by the nmap tool? (single selection).

A.
Operating system version
A.
Operating system version
Answers
B.
Port
B.
Port
Answers
C.
Services
C.
Services
Answers
D.
System vulnerabilities
D.
System vulnerabilities
Answers
Suggested answer: D

Which of the following attacks can be addressed using cybertrapping? (Single selection)

A.
DDos
A.
DDos
Answers
B.
Malformed message attack
B.
Malformed message attack
Answers
C.
TCP port scanning
C.
TCP port scanning
Answers
D.
Oversized ICMP packet attack
D.
Oversized ICMP packet attack
Answers
Suggested answer: C
Total 276 questions
Go to page: of 28