ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

To protect against viruses, which of the following security appliances can be deployed at the cloud network perimeter? (single selection).

Bastion host
Bastion host
Database audit
Database audit
Anti-DDos
Anti-DDos
Sandbox
Sandbox
Suggested answer: D
asked 18/09/2024
Ronakkumar Shyani
52 questions

Question 152

Report Export Collapse

Which of the following options does not need to be designed when implementing data storage security in the cloud? (Single selection)

Document encryption
Document encryption
Key management
Key management
Database encryption
Database encryption
Data upload encryption
Data upload encryption
Suggested answer: D
asked 18/09/2024
ahmad hafiz
40 questions

Question 153

Report Export Collapse

The following describes the transparent proxy deployment features of WAF Which is correct?

(multiple selection).

The content of the packet is not changed when it is forwarded
The content of the packet is not changed when it is forwarded
There is no need for the network layer, and the application layer can be changed There is also no need to make configuration changes on any device
There is no need for the network layer, and the application layer can be changed There is also no need to make configuration changes on any device
Traffic needs to be redirected to the WAF device.
Traffic needs to be redirected to the WAF device.
The client does not directly establish a connection with the server, which can hide the server
The client does not directly establish a connection with the server, which can hide the server
Suggested answer: A, B
asked 18/09/2024
Pang Guo Ming
35 questions

Question 154

Report Export Collapse

When you realize the security of cloud transmission Which of the following do we generally consider? (multiple selection).

Data source authentication
Data source authentication
Data encryption efficiency
Data encryption efficiency
Encryption of transmission data
Encryption of transmission data
Integrity check
Integrity check
Suggested answer: A, B, C, D
asked 18/09/2024
claudine Nguepnang
46 questions

Question 155

Report Export Collapse

In • User Login Web Page with User Name and Password Medium The following is about Username" Which one is described correctly? (single selection).

Identification
Identification
Identity authentication
Identity authentication
Billing
Billing
Authorization
Authorization
Suggested answer: A
asked 18/09/2024
Claudious Utete
45 questions

Question 156

Report Export Collapse

The following describes the differences between ISMS and graded protection What are the correct options? (multiple selection).

The construction result of 1SMS is to establish a set of ISMS system documents for the organization Strongly strengthen the Organization's information security, and the result of the rating assessment is to give whether the subject meets the stated security level requirements.
The construction result of 1SMS is to establish a set of ISMS system documents for the organization Strongly strengthen the Organization's information security, and the result of the rating assessment is to give whether the subject meets the stated security level requirements.
The graded protection system is a basic system for ensuring information security Both technology and qualifications are taken into account The focus is on how to leverage existing sophisticated protection critical information systems It mainly reflects the classification of hierarchies Protect the idea of focus. While ISMS is mainly from the perspective of security management The focus is on the establishment of information security guidelines, policies and security management systems and security management organizations within the organization or its specific scope, and their effective implementation, which mainly reflects the role and importance of security management.
The graded protection system is a basic system for ensuring information security Both technology and qualifications are taken into account The focus is on how to leverage existing sophisticated protection critical information systems It mainly reflects the classification of hierarchies Protect the idea of focus. While ISMS is mainly from the perspective of security management The focus is on the establishment of information security guidelines, policies and security management systems and security management organizations within the organization or its specific scope, and their effective implementation, which mainly reflects the role and importance of security management.
The implementation objects of graded protection are mainly those of various enterprise units, while the implementation objects of ISMS are mainly government departments such as party and government organs at all levels that have the requirements of information system levels.
The implementation objects of graded protection are mainly those of various enterprise units, while the implementation objects of ISMS are mainly government departments such as party and government organs at all levels that have the requirements of information system levels.
The complete implementation process of ISMS runs through the entire life cycle of the information system The complete implementation process of graded protection runs through the entire life cycle of the management system of the organization or a specific scope of the organization , and can be synchronized with the management system of a specific scope of the organization or organization. It can also be carried out on the basis that its management system has been established.
The complete implementation process of ISMS runs through the entire life cycle of the information system The complete implementation process of graded protection runs through the entire life cycle of the management system of the organization or a specific scope of the organization , and can be synchronized with the management system of a specific scope of the organization or organization. It can also be carried out on the basis that its management system has been established.
Suggested answer: A, B
asked 18/09/2024
VIVEKANANDAN BALARAMAN
44 questions

Question 157

Report Export Collapse

Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)

Agile-controller DCN
Agile-controller DCN
FireHunter
FireHunter
VSCAN
VSCAN
SecoManager
SecoManager
Suggested answer: A, B, D
asked 18/09/2024
Neil Mallia
55 questions

Question 158

Report Export Collapse

If the attributes of the file all match the match conditions of the rule Then this file successfully matches the rules for the file to be overmixed with the poppy file. If one of the conditions does not match • The next rule continues to be matched, and so on If all the rules do not match FW will discard the file o (single selection).

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Amidou Florian TOURE
36 questions

Question 159

Report Export Collapse

When it is not in the same deployment as the log server, only FW can send conference logs to the log server through the IPSec tunnel and GRE tunnel (single selection).

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Maxim Shpakov
49 questions

Question 160

Report Export Collapse

Which of the following types of journals cannot use the Netflow format? (single selection).

URL session logs
URL session logs
Half-connection session logs
Half-connection session logs
IPV6NAT64 SESSION LOGS
IPV6NAT64 SESSION LOGS
IPV4 SESSION LOGS
IPV4 SESSION LOGS
Suggested answer: A
asked 18/09/2024
Manoj A Rajan
45 questions
Total 276 questions
Go to page: of 28
Search

Related questions