ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 15

Question list
Search
Search

Related questions











Which of the following standard bills is relevant to security audits? (Multiple selection)

A.
sox
A.
sox
Answers
B.
IS027001
B.
IS027001
Answers
C.
IS022000
C.
IS022000
Answers
D.
Graded protection
D.
Graded protection
Answers
Suggested answer: A, B, D

The following describes the role of logs Which one is wrong? (single selection).

A.
Attack traceability
A.
Attack traceability
Answers
B.
Log storage
B.
Log storage
Answers
C.
Virus blockade
C.
Virus blockade
Answers
D.
O&M failure analysis
D.
O&M failure analysis
Answers
Suggested answer: C

Categorize vulnerabilities by common ways Which of the following types of vulnerabilities should XSS fall into? (single selection).

A.
Webloophole
A.
Webloophole
Answers
B.
Host vulnerabilities
B.
Host vulnerabilities
Answers
C.
Middleware vulnerabilities
C.
Middleware vulnerabilities
Answers
D.
Database vulnerabilities
D.
Database vulnerabilities
Answers
Suggested answer: A

A VPCA and VPCB are created under a virtual data center VDC, and host A (192.168.1.100/24) is applied for in the VPCA Filed Host B (1921682100/24). Now configure VPC access Create a virtual firewall security policy as follows:

Security-policy Source-zone any destination-zone any source-address 192.168.2.100 32 destination-address 192.168.1.100 32 action permit Which of the following statements is correct?

A.
A and B cannot visit each other
A.
A and B cannot visit each other
Answers
B.
Only A is allowed to access B
B.
Only A is allowed to access B
Answers
C.
A and B are able to visit each other
C.
A and B are able to visit each other
Answers
D.
Only B is allowed to visit A
D.
Only B is allowed to visit A
Answers
Suggested answer: D

Which of the following options is not included in virtualization security? (single selection).

A.
Physical machine security
A.
Physical machine security
Answers
B.
Virtualization platform security
B.
Virtualization platform security
Answers
C.
Virtualized inter-network security
C.
Virtualized inter-network security
Answers
D.
Virtual machine security
D.
Virtual machine security
Answers
Suggested answer: D

If you want to intelligently select traffic for the source IP address, you can use which of the following intelligent routing methods^ (single selection).

A.
Global traffic steering strategy
A.
Global traffic steering strategy
Answers
B.
Policy routing and routing
B.
Policy routing and routing
Answers
C.
ISProuting
C.
ISProuting
Answers
D.
Health check
D.
Health check
Answers
Suggested answer: B

In the cloud data center network Where are Anti-DDos appliances deployed? (single selection).

A.
Security operation and maintenance area
A.
Security operation and maintenance area
Answers
B.
Secure storage area
B.
Secure storage area
Answers
C.
Border network area
C.
Border network area
Answers
D.
Secure computing area
D.
Secure computing area
Answers
Suggested answer: C

The following is a description of DNS transparent proxy Which ones are correct? (multiple selection).

A.
The DNS proxy function replaces the source address header in the DNS request packet.
A.
The DNS proxy function replaces the source address header in the DNS request packet.
Answers
B.
After enabling the DNS transparent proxy function The DNS server address to replace is determined for the outgoing interface
B.
After enabling the DNS transparent proxy function The DNS server address to replace is determined for the outgoing interface
Answers
C.
In the case of NGFW as the exit network and the DNS server of the enterprise intranet The DNS transparent proxy function can still be implemented normally.
C.
In the case of NGFW as the exit network and the DNS server of the enterprise intranet The DNS transparent proxy function can still be implemented normally.
Answers
D.
Two DNS requests for the same user in the case of DNS transparent proxies The replaced address may be different.
D.
Two DNS requests for the same user in the case of DNS transparent proxies The replaced address may be different.
Answers
Suggested answer: B, D

In the following description of IPv6 security features, which one is wrong? (single selection).

A.
As IPv6 DNS and other related protocols are designed for security
A.
As IPv6 DNS and other related protocols are designed for security
Answers
B.
IPv6 addresses can be generated by encryption However, privacy headers are not supported
B.
IPv6 addresses can be generated by encryption However, privacy headers are not supported
Answers
C.
AH, and ES can be used as extension headers for IPv6 IPsec is used for additional security.
C.
AH, and ES can be used as extension headers for IPv6 IPsec is used for additional security.
Answers
D.
The IPv6 address is 128 bits to ensure that the source address is trusted
D.
The IPv6 address is 128 bits to ensure that the source address is trusted
Answers
Suggested answer: D

The following describes the network layer protection plan for HUAWEI CLOUD security architecture Which one is incorrect? (single selection).

A.
Tenants can be isolated through security group networks.
A.
Tenants can be isolated through security group networks.
Answers
B.
Fire protection is implemented between HUAWEI CLOUD and the customer network
B.
Fire protection is implemented between HUAWEI CLOUD and the customer network
Answers
C.
Cloud network perimeter protection DDos can only be achieved by deploying anti-DDoS appliances.
C.
Cloud network perimeter protection DDos can only be achieved by deploying anti-DDoS appliances.
Answers
D.
The cloud network boundary protects service availability through DDos defense.
D.
The cloud network boundary protects service availability through DDos defense.
Answers
Suggested answer: C
Total 276 questions
Go to page: of 28