ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Which of the following are the following ways to protect enterprise users from viruses? (Multiple selection)

A.
Close unnecessary ports of the host
A.
Close unnecessary ports of the host
Answers
B.
Install anti-virus software
B.
Install anti-virus software
Answers
C.
Patching
C.
Patching
Answers
D.
Enhance safety awareness
D.
Enhance safety awareness
Answers
Suggested answer: A, B, C, D

If it is in the intrusion prevention configuration file Signatures, signature filters, and exception signatures are used at the same time When there is a configuration to the configuration file The following is about the order of matching Which option is correct? (single selection).

A.
Exception Signature>Signature>Signature filter
A.
Exception Signature>Signature>Signature filter
Answers
B.
Exception Signature>Signature Over Filter>Signature
B.
Exception Signature>Signature Over Filter>Signature
Answers
C.
Signature>Signature Filter >Exception Signature
C.
Signature>Signature Filter >Exception Signature
Answers
D.
Signature filter >Signature>Exception signature
D.
Signature filter >Signature>Exception signature
Answers
Suggested answer: B

The following describes how to create a trap account Which one is correct? (single selection).

A.
The following describes how to create a trap account Which one is correct? (single selection).
A.
The following describes how to create a trap account Which one is correct? (single selection).
Answers
B.
Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits
B.
Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits
Answers
C.
Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits
C.
Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits
Answers
D.
Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits
D.
Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits
Answers
E.
Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits
E.
Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits
Answers
Suggested answer: C

In the HCIE-Security V2.0 course architecture, which of the following pieces are included? (multiple selection).

A.
Cloud security
A.
Cloud security
Answers
B.
Security operations and analytics
B.
Security operations and analytics
Answers
C.
Security attack and defense technology
C.
Security attack and defense technology
Answers
D.
Code auditing
D.
Code auditing
Answers
Suggested answer: A, B, C

Determine the goal, 2 Intranet forwarding' 3 Intranet penetration, 4 Trace removal, 5 Information Collection, 6 Vulnerability detection, 7 Exploit vulnerabilities, 8 Write test reports. The following is the correct understanding of the penetration test process' (single selection).

A.
1-5-6-7-4-2-3-8
A.
1-5-6-7-4-2-3-8
Answers
B.
1-5-6-7-2-3-4-8
B.
1-5-6-7-2-3-4-8
Answers
C.
1 -5-6-7-3-2-4-8
C.
1 -5-6-7-3-2-4-8
Answers
D.
·5·2·3·4·6·7·8
D.
·5·2·3·4·6·7·8
Answers
Suggested answer: B

A data center creates subnet A and subnet B under the same VPC network If you add the host to security group A and move it out of the default security group, which of the following is correct? (single selection).

A.
A and B are able to visit each other
A.
A and B are able to visit each other
Answers
B.
and B are not accessible
B.
and B are not accessible
Answers
C.
Only A is allowed to access B
C.
Only A is allowed to access B
Answers
D.
Only B is allowed to access A
D.
Only B is allowed to access A
Answers
Suggested answer: B

Which of the following is not a way to back up data? (Single selection)

A.
Server-Less ?
A.
Server-Less ?
Answers
B.
Client-Less backup
B.
Client-Less backup
Answers
C.
LAN-Free S?
C.
LAN-Free S?
Answers
D.
LAN backup
D.
LAN backup
Answers
Suggested answer: B

Which of the following options is not part of the base metric of CVSS assessment? (single selection).

A.
Scope
A.
Scope
Answers
B.
Attack vector
B.
Attack vector
Answers
C.
Availability impact
C.
Availability impact
Answers
D.
Vulnerability severity level
D.
Vulnerability severity level
Answers
Suggested answer: D

What are the following descriptions of cybertrapping techniques that are wrong? (multiple selection).

A.
Trapping needles support simulation services
A.
Trapping needles support simulation services
Answers
B.
The trapping technology scheme consists of two parts: trap and trapping probe
B.
The trapping technology scheme consists of two parts: trap and trapping probe
Answers
C.
The trapping probe is a honeypot
C.
The trapping probe is a honeypot
Answers
D.
The trapping probe is responsible for identifying the scanning behavior in the network and directing traffic to the trap
D.
The trapping probe is responsible for identifying the scanning behavior in the network and directing traffic to the trap
Answers
Suggested answer: A, C

Which of the following options is a DDOS attack against the application layer? (multiple selection).

A.
DNS reflection attacks
A.
DNS reflection attacks
Answers
B.
UDP fragmentation attacks
B.
UDP fragmentation attacks
Answers
C.
HTTP slow attacks
C.
HTTP slow attacks
Answers
D.
TCPSYN flood attack
D.
TCPSYN flood attack
Answers
Suggested answer: A, C
Total 276 questions
Go to page: of 28