ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 20

Question list
Search
Search

Related questions











The following describes the black hole route Which one is wrong? (single selection).

A.
When the NAT address pool address and the public network interface address are not on the same network segment Blackhole routing must be configured.
A.
When the NAT address pool address and the public network interface address are not on the same network segment Blackhole routing must be configured.
Answers
B.
The black hole routing configuration consumes the CPU processing resources of the device.
B.
The black hole routing configuration consumes the CPU processing resources of the device.
Answers
C.
Configuration command line of black hole routing: ip route-static (ip-address) null o
C.
Configuration command line of black hole routing: ip route-static (ip-address) null o
Answers
D.
Configure the destination NAT In order to prevent the routing environment, the concubine needs to configure a blackholed route to the destination IP address before translation.
D.
Configure the destination NAT In order to prevent the routing environment, the concubine needs to configure a blackholed route to the destination IP address before translation.
Answers
Suggested answer: B

To ensure the security of the VPC between the user's on-premises data center and the VPC on the cloud Which of the following technologies does HUAWEI CLOUD use?

(Single selection)

A.
SSL VPN
A.
SSL VPN
Answers
B.
MPLS VPN
B.
MPLS VPN
Answers
C.
GRE VPN
C.
GRE VPN
Answers
D.
IPsecVPN
D.
IPsecVPN
Answers
Suggested answer: D

The following description of information security training Which items are correct? (multiple selection).

A.
Even for safety training, the focus will be different for different departments.
A.
Even for safety training, the focus will be different for different departments.
Answers
B.
In terms of training content For senior executives, training on information security strategies and information security laws and regulations is required.
B.
In terms of training content For senior executives, training on information security strategies and information security laws and regulations is required.
Answers
C.
For grassroots employees, some safety technology training should be emphasized.
C.
For grassroots employees, some safety technology training should be emphasized.
Answers
D.
In terms of training method For most employees, just one induction training is not enough attention, and frequent email campaigns are needed to raise awareness of information security
D.
In terms of training method For most employees, just one induction training is not enough attention, and frequent email campaigns are needed to raise awareness of information security
Answers
Suggested answer: B, D

The guarantee of information security does not need to be fully integrated with business implementation, because information security will increase the complexity of the network and reduce the efficiency of business processing. (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The following is a description of traceability audits Which one is correct? (single selection).

A.
In a networking environment where the packet return path is inconsistent, the content of the audit log record is not complete.
A.
In a networking environment where the packet return path is inconsistent, the content of the audit log record is not complete.
Answers
B.
Only audit administrators can configure audit functions and view audit logs
B.
Only audit administrators can configure audit functions and view audit logs
Answers
C.
In the security policy, traffic configured as deny will be processed by the audit policy.
C.
In the security policy, traffic configured as deny will be processed by the audit policy.
Answers
D.
The audit strategy includes two parts: conditions and actions By matching any of the conditions, a response action can be performed.
D.
The audit strategy includes two parts: conditions and actions By matching any of the conditions, a response action can be performed.
Answers
Suggested answer: B

What is correct in the following description of the capabilities of cybertrapping techniques? (multiple selection).

A.
Network trapping technology can automatically sense APR-MISS and realize trapping.
A.
Network trapping technology can automatically sense APR-MISS and realize trapping.
Answers
B.
Network trapping technology can automatically sense the non-existence of IP and realize trapping.
B.
Network trapping technology can automatically sense the non-existence of IP and realize trapping.
Answers
C.
Network trapping technology can automatically sense the absence of MAC addresses and realize trapping.
C.
Network trapping technology can automatically sense the absence of MAC addresses and realize trapping.
Answers
D.
Network trapping technology can automatically sense open ports and realize trapping.
D.
Network trapping technology can automatically sense open ports and realize trapping.
Answers
Suggested answer: A, B

Which of the following are China's information security standards organizations, multiple selections)

A.
National Internet Emergency Response Center
A.
National Internet Emergency Response Center
Answers
B.
Technical Committee on Information Technology Security Standardization
B.
Technical Committee on Information Technology Security Standardization
Answers
C.
China Association for Work Safety (CAWS).
C.
China Association for Work Safety (CAWS).
Answers
D.
Network and Information Security Technical Working Committee of China Communications Standards Association (CCSA).
D.
Network and Information Security Technical Working Committee of China Communications Standards Association (CCSA).
Answers
Suggested answer: B, D

What resources do I need to manage in user management? (Multiple selection)

A.
Information
A.
Information
Answers
B.
System
B.
System
Answers
C.
Services
C.
Services
Answers
D.
Equipment
D.
Equipment
Answers
Suggested answer: B, C, D

What are the logical/technical access controls in the following equation? (multiple selection).

A.
Access control list
A.
Access control list
Answers
B.
Camera
B.
Camera
Answers
C.
Encryption
C.
Encryption
Answers
D.
Employment Guidelines
D.
Employment Guidelines
Answers
Suggested answer: A, C

Which of the following access control types is defined according to the organization's security policy or (single-select).

A.
Administrative access control
A.
Administrative access control
Answers
B.
Logical/technical access control
B.
Logical/technical access control
Answers
C.
Physical access control
C.
Physical access control
Answers
D.
Corrective access control
D.
Corrective access control
Answers
Suggested answer: A
Total 276 questions
Go to page: of 28