ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

Which of the following are the following ways to protect enterprise users from viruses? (Multiple selection)

Close unnecessary ports of the host
Close unnecessary ports of the host
Install anti-virus software
Install anti-virus software
Patching
Patching
Enhance safety awareness
Enhance safety awareness
Suggested answer: A, B, C, D
asked 18/09/2024
Venkata Nandyala
43 questions

Question 122

Report Export Collapse

If it is in the intrusion prevention configuration file Signatures, signature filters, and exception signatures are used at the same time When there is a configuration to the configuration file The following is about the order of matching Which option is correct? (single selection).

Exception Signature>Signature>Signature filter
Exception Signature>Signature>Signature filter
Exception Signature>Signature Over Filter>Signature
Exception Signature>Signature Over Filter>Signature
Signature>Signature Filter >Exception Signature
Signature>Signature Filter >Exception Signature
Signature filter >Signature>Exception signature
Signature filter >Signature>Exception signature
Suggested answer: B
asked 18/09/2024
Ricardo Monsalve
40 questions

Question 123

Report Export Collapse

The following describes how to create a trap account Which one is correct? (single selection).

The following describes how to create a trap account Which one is correct? (single selection).
The following describes how to create a trap account Which one is correct? (single selection).
Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits
Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits
Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits
Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits
Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits
Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits
Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits
Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits
Suggested answer: C
asked 18/09/2024
Arti Karangiya
37 questions

Question 124

Report Export Collapse

In the HCIE-Security V2.0 course architecture, which of the following pieces are included? (multiple selection).

Cloud security
Cloud security
Security operations and analytics
Security operations and analytics
Security attack and defense technology
Security attack and defense technology
Code auditing
Code auditing
Suggested answer: A, B, C
asked 18/09/2024
Harieswaran Ramesh
43 questions

Question 125

Report Export Collapse

Determine the goal, 2 Intranet forwarding' 3 Intranet penetration, 4 Trace removal, 5 Information Collection, 6 Vulnerability detection, 7 Exploit vulnerabilities, 8 Write test reports. The following is the correct understanding of the penetration test process' (single selection).

1-5-6-7-4-2-3-8
1-5-6-7-4-2-3-8
1-5-6-7-2-3-4-8
1-5-6-7-2-3-4-8
1 -5-6-7-3-2-4-8
1 -5-6-7-3-2-4-8
Β·5Β·2Β·3Β·4Β·6Β·7Β·8
Β·5Β·2Β·3Β·4Β·6Β·7Β·8
Suggested answer: B
asked 18/09/2024
Rama Krishna
42 questions

Question 126

Report Export Collapse

A data center creates subnet A and subnet B under the same VPC network If you add the host to security group A and move it out of the default security group, which of the following is correct? (single selection).

A and B are able to visit each other
A and B are able to visit each other
and B are not accessible
and B are not accessible
Only A is allowed to access B
Only A is allowed to access B
Only B is allowed to access A
Only B is allowed to access A
Suggested answer: B
asked 18/09/2024
kevin klyn
42 questions

Question 127

Report Export Collapse

Which of the following is not a way to back up data? (Single selection)

Server-Less ?
Server-Less ?
Client-Less backup
Client-Less backup
LAN-Free S?
LAN-Free S?
LAN backup
LAN backup
Suggested answer: B
asked 18/09/2024
Kareem Dadoul
52 questions

Question 128

Report Export Collapse

Which of the following options is not part of the base metric of CVSS assessment? (single selection).

Scope
Scope
Attack vector
Attack vector
Availability impact
Availability impact
Vulnerability severity level
Vulnerability severity level
Suggested answer: D
asked 18/09/2024
SCOTTIE EASTER
47 questions

Question 129

Report Export Collapse

What are the following descriptions of cybertrapping techniques that are wrong? (multiple selection).

Trapping needles support simulation services
Trapping needles support simulation services
The trapping technology scheme consists of two parts: trap and trapping probe
The trapping technology scheme consists of two parts: trap and trapping probe
The trapping probe is a honeypot
The trapping probe is a honeypot
The trapping probe is responsible for identifying the scanning behavior in the network and directing traffic to the trap
The trapping probe is responsible for identifying the scanning behavior in the network and directing traffic to the trap
Suggested answer: A, C
asked 18/09/2024
Vo Quoc Bao
42 questions

Question 130

Report Export Collapse

Which of the following options is a DDOS attack against the application layer? (multiple selection).

DNS reflection attacks
DNS reflection attacks
UDP fragmentation attacks
UDP fragmentation attacks
HTTP slow attacks
HTTP slow attacks
TCPSYN flood attack
TCPSYN flood attack
Suggested answer: A, C
asked 18/09/2024
Maria Janice Lecias
54 questions
Total 276 questions
Go to page: of 28

Related questions