Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 16

List of questions
Question 151

To protect against viruses, which of the following security appliances can be deployed at the cloud network perimeter? (single selection).
Question 152

Which of the following options does not need to be designed when implementing data storage security in the cloud? (Single selection)
Question 153

The following describes the transparent proxy deployment features of WAF Which is correct?
(multiple selection).
Question 154

When you realize the security of cloud transmission Which of the following do we generally consider? (multiple selection).
Question 155

In • User Login Web Page with User Name and Password Medium The following is about Username" Which one is described correctly? (single selection).
Question 156

The following describes the differences between ISMS and graded protection What are the correct options? (multiple selection).
Question 157

Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)
Question 158

If the attributes of the file all match the match conditions of the rule Then this file successfully matches the rules for the file to be overmixed with the poppy file. If one of the conditions does not match • The next rule continues to be matched, and so on If all the rules do not match FW will discard the file o (single selection).
Question 159

When it is not in the same deployment as the log server, only FW can send conference logs to the log server through the IPSec tunnel and GRE tunnel (single selection).
Question 160

Which of the following types of journals cannot use the Netflow format? (single selection).
Question