ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











To protect against viruses, which of the following security appliances can be deployed at the cloud network perimeter? (single selection).

A.
Bastion host
A.
Bastion host
Answers
B.
Database audit
B.
Database audit
Answers
C.
Anti-DDos
C.
Anti-DDos
Answers
D.
Sandbox
D.
Sandbox
Answers
Suggested answer: D

Which of the following options does not need to be designed when implementing data storage security in the cloud? (Single selection)

A.
Document encryption
A.
Document encryption
Answers
B.
Key management
B.
Key management
Answers
C.
Database encryption
C.
Database encryption
Answers
D.
Data upload encryption
D.
Data upload encryption
Answers
Suggested answer: D

The following describes the transparent proxy deployment features of WAF Which is correct?

(multiple selection).

A.
The content of the packet is not changed when it is forwarded
A.
The content of the packet is not changed when it is forwarded
Answers
B.
There is no need for the network layer, and the application layer can be changed There is also no need to make configuration changes on any device
B.
There is no need for the network layer, and the application layer can be changed There is also no need to make configuration changes on any device
Answers
C.
Traffic needs to be redirected to the WAF device.
C.
Traffic needs to be redirected to the WAF device.
Answers
D.
The client does not directly establish a connection with the server, which can hide the server
D.
The client does not directly establish a connection with the server, which can hide the server
Answers
Suggested answer: A, B

When you realize the security of cloud transmission Which of the following do we generally consider? (multiple selection).

A.
Data source authentication
A.
Data source authentication
Answers
B.
Data encryption efficiency
B.
Data encryption efficiency
Answers
C.
Encryption of transmission data
C.
Encryption of transmission data
Answers
D.
Integrity check
D.
Integrity check
Answers
Suggested answer: A, B, C, D

In • User Login Web Page with User Name and Password Medium The following is about Username" Which one is described correctly? (single selection).

A.
Identification
A.
Identification
Answers
B.
Identity authentication
B.
Identity authentication
Answers
C.
Billing
C.
Billing
Answers
D.
Authorization
D.
Authorization
Answers
Suggested answer: A

The following describes the differences between ISMS and graded protection What are the correct options? (multiple selection).

A.
The construction result of 1SMS is to establish a set of ISMS system documents for the organization Strongly strengthen the Organization's information security, and the result of the rating assessment is to give whether the subject meets the stated security level requirements.
A.
The construction result of 1SMS is to establish a set of ISMS system documents for the organization Strongly strengthen the Organization's information security, and the result of the rating assessment is to give whether the subject meets the stated security level requirements.
Answers
B.
The graded protection system is a basic system for ensuring information security Both technology and qualifications are taken into account The focus is on how to leverage existing sophisticated protection critical information systems It mainly reflects the classification of hierarchies Protect the idea of focus. While ISMS is mainly from the perspective of security management The focus is on the establishment of information security guidelines, policies and security management systems and security management organizations within the organization or its specific scope, and their effective implementation, which mainly reflects the role and importance of security management.
B.
The graded protection system is a basic system for ensuring information security Both technology and qualifications are taken into account The focus is on how to leverage existing sophisticated protection critical information systems It mainly reflects the classification of hierarchies Protect the idea of focus. While ISMS is mainly from the perspective of security management The focus is on the establishment of information security guidelines, policies and security management systems and security management organizations within the organization or its specific scope, and their effective implementation, which mainly reflects the role and importance of security management.
Answers
C.
The implementation objects of graded protection are mainly those of various enterprise units, while the implementation objects of ISMS are mainly government departments such as party and government organs at all levels that have the requirements of information system levels.
C.
The implementation objects of graded protection are mainly those of various enterprise units, while the implementation objects of ISMS are mainly government departments such as party and government organs at all levels that have the requirements of information system levels.
Answers
D.
The complete implementation process of ISMS runs through the entire life cycle of the information system The complete implementation process of graded protection runs through the entire life cycle of the management system of the organization or a specific scope of the organization , and can be synchronized with the management system of a specific scope of the organization or organization. It can also be carried out on the basis that its management system has been established.
D.
The complete implementation process of ISMS runs through the entire life cycle of the information system The complete implementation process of graded protection runs through the entire life cycle of the management system of the organization or a specific scope of the organization , and can be synchronized with the management system of a specific scope of the organization or organization. It can also be carried out on the basis that its management system has been established.
Answers
Suggested answer: A, B

Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)

A.
Agile-controller DCN
A.
Agile-controller DCN
Answers
B.
FireHunter
B.
FireHunter
Answers
C.
VSCAN
C.
VSCAN
Answers
D.
SecoManager
D.
SecoManager
Answers
Suggested answer: A, B, D

If the attributes of the file all match the match conditions of the rule Then this file successfully matches the rules for the file to be overmixed with the poppy file. If one of the conditions does not match • The next rule continues to be matched, and so on If all the rules do not match FW will discard the file o (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

When it is not in the same deployment as the log server, only FW can send conference logs to the log server through the IPSec tunnel and GRE tunnel (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Which of the following types of journals cannot use the Netflow format? (single selection).

A.
URL session logs
A.
URL session logs
Answers
B.
Half-connection session logs
B.
Half-connection session logs
Answers
C.
IPV6NAT64 SESSION LOGS
C.
IPV6NAT64 SESSION LOGS
Answers
D.
IPV4 SESSION LOGS
D.
IPV4 SESSION LOGS
Answers
Suggested answer: A
Total 276 questions
Go to page: of 28