Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 16
List of questions
Question 151
To protect against viruses, which of the following security appliances can be deployed at the cloud network perimeter? (single selection).
Question 152
Which of the following options does not need to be designed when implementing data storage security in the cloud? (Single selection)
Question 153
The following describes the transparent proxy deployment features of WAF Which is correct?
(multiple selection).
Question 154
When you realize the security of cloud transmission Which of the following do we generally consider? (multiple selection).
Question 155
In • User Login Web Page with User Name and Password Medium The following is about Username" Which one is described correctly? (single selection).
Question 156
The following describes the differences between ISMS and graded protection What are the correct options? (multiple selection).
Question 157
Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)
Question 158
If the attributes of the file all match the match conditions of the rule Then this file successfully matches the rules for the file to be overmixed with the poppy file. If one of the conditions does not match • The next rule continues to be matched, and so on If all the rules do not match FW will discard the file o (single selection).
Question 159
When it is not in the same deployment as the log server, only FW can send conference logs to the log server through the IPSec tunnel and GRE tunnel (single selection).
Question 160
Which of the following types of journals cannot use the Netflow format? (single selection).
Question