ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 21

Question list
Search
Search

Related questions











What are the correct options for describing the impact of IPv6 technology on cyberattacks (multiple selection).

A.
IPV6 is enough to take into account the security aspects and does not have its own security vulnerabilities.
A.
IPV6 is enough to take into account the security aspects and does not have its own security vulnerabilities.
Answers
B.
IPv6 also has a defensive effect on application-layer spoofing attacks.
B.
IPv6 also has a defensive effect on application-layer spoofing attacks.
Answers
C.
In the IPv6 environment Sharding attacks, ARP, and DHCP attacks can be mitigated or eliminated to some extent.
C.
In the IPv6 environment Sharding attacks, ARP, and DHCP attacks can be mitigated or eliminated to some extent.
Answers
D.
IPv6 has the ability to locate the initiator of the attack through attacks
D.
IPv6 has the ability to locate the initiator of the attack through attacks
Answers
Suggested answer: B, C, D

The following description of configuring elog management, which one is wrong? (single selection).

A.
By default eLog does not parse session creation logs, if you need to parse and display session creation logs on eLog, you need to configure them on the collector.
A.
By default eLog does not parse session creation logs, if you need to parse and display session creation logs on eLog, you need to configure them on the collector.
Answers
B.
At present, elog supports manual addition and automatic discovery of two ways to manage FW The manual addition method requires SNMP parameters to be configured on the FW.
B.
At present, elog supports manual addition and automatic discovery of two ways to manage FW The manual addition method requires SNMP parameters to be configured on the FW.
Answers
C.
The time zone and time on FW must be consistent with the time zone and time on the eLog cold collector, otherwise the log viewing results will be affected.
C.
The time zone and time on FW must be consistent with the time zone and time on the eLog cold collector, otherwise the log viewing results will be affected.
Answers
D.
If FW simultaneously imports session aging logs, session new logs, and periodic session logs This will cause an increase in the number of logs received by eLog Consume eLog storage space.
D.
If FW simultaneously imports session aging logs, session new logs, and periodic session logs This will cause an increase in the number of logs received by eLog Consume eLog storage space.
Answers
Suggested answer: B

The following describes vulnerabilities and identification and assessment Which one is incorrect?

(single selection).

A.
In the technical vulnerability point, identify the vulnerable point of the application system From the audit mechanism Audit storage and access control policies. Data integrity Identification Password protection and other aspects for identification.
A.
In the technical vulnerability point, identify the vulnerable point of the application system From the audit mechanism Audit storage and access control policies. Data integrity Identification Password protection and other aspects for identification.
Answers
B.
Vulnerability identification is also called vulnerability identification, and weakness is the existence of capital itself If there is no corresponding threat, the weakness itself will not cause damage to capital.
B.
Vulnerability identification is also called vulnerability identification, and weakness is the existence of capital itself If there is no corresponding threat, the weakness itself will not cause damage to capital.
Answers
C.
Vulnerability points are divided into two types: technical vulnerabilities and management vulnerabilities. The management vulnerability identification image is only for the management part of the organization
C.
Vulnerability points are divided into two types: technical vulnerabilities and management vulnerabilities. The management vulnerability identification image is only for the management part of the organization
Answers
D.
The severity of the technical vulnerability of an asset is affected by the organization's management vulnerability. Therefore, the vulnerability of assets should also be assigned with reference to the severity of technical management and organizational management vulnerabilities.
D.
The severity of the technical vulnerability of an asset is affected by the organization's management vulnerability. Therefore, the vulnerability of assets should also be assigned with reference to the severity of technical management and organizational management vulnerabilities.
Answers
Suggested answer: C

Implement secure communication network requirements for Class-Protect on HUAWEI CLOUD Which of the following services does not need to be covered? (single selection).

A.
Install anti-virus software
A.
Install anti-virus software
Answers
B.
Web application protection
B.
Web application protection
Answers
C.
Anti-DDoS Pro
C.
Anti-DDoS Pro
Answers
D.
Security groups
D.
Security groups
Answers
Suggested answer: A

With the following description of the database auditing system, which option is wrong? (single selection).

A.
Detect abnormal operations of legitimate users.
A.
Detect abnormal operations of legitimate users.
Answers
B.
Usually carry out direct deployment, extract messages and records.
B.
Usually carry out direct deployment, extract messages and records.
Answers
C.
Ability to analyze operational behavior that does not contain threat signatures.
C.
Ability to analyze operational behavior that does not contain threat signatures.
Answers
D.
Support deployment in cloud environment, and the strategy is matched as needed Rules are on demand.
D.
Support deployment in cloud environment, and the strategy is matched as needed Rules are on demand.
Answers
Suggested answer: B

The National Graded Protection System (GB) is in the process of grading The assessment is based on the safety management assessment requirements in IS027001. (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Hypothetical has a set of raw data as follows: ·10, 20. 30. 40, 50" The set of data was desensitized by randomly swapping the position of the data, and the desensitized data was: ·30 20. 50. 10.

40\Which of the following algorithms is used in this data masking method? (single selection).

A.
AV hash
A.
AV hash
Answers
B.
Change
B.
Change
Answers
C.
Load break
C.
Load break
Answers
D.
Noise
D.
Noise
Answers
Suggested answer: B

Which of the following descriptions of user management is wrong? (single selection).

A.
User management can control the resources that users access.
A.
User management can control the resources that users access.
Answers
B.
Management is a basic safety management.
B.
Management is a basic safety management.
Answers
C.
Administrators can manage users' use of resources through AAA.
C.
Administrators can manage users' use of resources through AAA.
Answers
D.
User management cannot control a user's access to specific resources.
D.
User management cannot control a user's access to specific resources.
Answers
Suggested answer: D

In the following description of the principles of network trapping defense, which are correct?

(multiple selection).

A.
Installing threats against network weapons, network trapping defense technology, can use deception to make the attack execute special commands in the trapping system
A.
Installing threats against network weapons, network trapping defense technology, can use deception to make the attack execute special commands in the trapping system
Answers
B.
In the face of viruses, worms, WebShell these weaponized attack methods, can use misleading methods to make the attack traffic be diverted to trap probe O
B.
In the face of viruses, worms, WebShell these weaponized attack methods, can use misleading methods to make the attack traffic be diverted to trap probe O
Answers
C.
For the detection behavior in the early stage of the attack, you can use deception to burst into defense. By creating various traps to mislead the attacker. Cause attackers to misunderstand the network structure, attack targets, and vulnerabilities.
C.
For the detection behavior in the early stage of the attack, you can use deception to burst into defense. By creating various traps to mislead the attacker. Cause attackers to misunderstand the network structure, attack targets, and vulnerabilities.
Answers
D.
Network trapping technology can disguise the actual business and vulnerabilities to mislead the attacker, so that the attacker can infiltrate the trapping system.
D.
Network trapping technology can disguise the actual business and vulnerabilities to mislead the attacker, so that the attacker can infiltrate the trapping system.
Answers
Suggested answer: A, C, D

Take the following description of safety measures Which one is wrong? (single selection).

A.
Security audit can identify risks by analyzing threat logs
A.
Security audit can identify risks by analyzing threat logs
Answers
B.
Security audit is usually divided into database audit, behavior audit and operation and maintenance audit
B.
Security audit is usually divided into database audit, behavior audit and operation and maintenance audit
Answers
C.
Security audit is generally a post-event audit, because permission management and authorization are the core of security audit
C.
Security audit is generally a post-event audit, because permission management and authorization are the core of security audit
Answers
D.
B/S architecture model and C/S class of database audit Implement a two-layer (presentation layer, data access layer) architecture
D.
B/S architecture model and C/S class of database audit Implement a two-layer (presentation layer, data access layer) architecture
Answers
Suggested answer: D
Total 276 questions
Go to page: of 28