ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











The following describes the authorization of the log license Which is correct? (single selection).

A.
The generation of anti-virus logs has nothing to do with license authorization
A.
The generation of anti-virus logs has nothing to do with license authorization
Answers
B.
The generation of intrusion prevention logs has nothing to do with license authorization
B.
The generation of intrusion prevention logs has nothing to do with license authorization
Answers
C.
The generation of audit logs has nothing to do with license authorization
C.
The generation of audit logs has nothing to do with license authorization
Answers
D.
Sandbox detection logs include local sandbox and cloud sandbox detection logs, and cloud sandbox detection requires license authorization
D.
Sandbox detection logs include local sandbox and cloud sandbox detection logs, and cloud sandbox detection requires license authorization
Answers
Suggested answer: D

In the Active Directory architecture, which of the following is a function of the network access server? (single selection).

A.
Billing server
A.
Billing server
Answers
B.
Authentication server
B.
Authentication server
Answers
C.
Firewall
C.
Firewall
Answers
D.
Client
D.
Client
Answers
Suggested answer: C

DNS Request Flood for DNS authoritative servers If TC source authentication is used The client device does not support using TCP to send DNS requests, how to verify the identity of the client? (single selection).

A.
Use planting load inspection
A.
Use planting load inspection
Answers
B.
Use DNS dynamic mode
B.
Use DNS dynamic mode
Answers
C.
Use 302 redirect
C.
Use 302 redirect
Answers
D.
Use CHAME
D.
Use CHAME
Answers
Suggested answer: B

Common database security audit techniques according to technical characteristics What are the categories that can be divided into? (multiple selection).

A.
Agent-based audit technology
A.
Agent-based audit technology
Answers
B.
Log-based estimation technology
B.
Log-based estimation technology
Answers
C.
Gateway-based audit technology
C.
Gateway-based audit technology
Answers
D.
Audit technology based on network monitoring
D.
Audit technology based on network monitoring
Answers
Suggested answer: A, B, C, D

Which of the following options does not reflect the advanced characteristics of APT attacks? (single selection).

A.
Sending API attacks generally requires the power of large organizations
A.
Sending API attacks generally requires the power of large organizations
Answers
B.
API attacks follow the course of the cyber attack chain
B.
API attacks follow the course of the cyber attack chain
Answers
C.
API attacks are generally more invisible Hide attacks by encrypting channels, for example
C.
API attacks are generally more invisible Hide attacks by encrypting channels, for example
Answers
D.
Zero-day vulnerabilities are used in API attacks
D.
Zero-day vulnerabilities are used in API attacks
Answers
Suggested answer: B

What are the common database intrusion detection techniques? (Multiple selection)

A.
Intrusion detection technology based on known attack behaviors
A.
Intrusion detection technology based on known attack behaviors
Answers
B.
Intrusion detection technology based on data mining
B.
Intrusion detection technology based on data mining
Answers
C.
Statistical-based intrusion detection technology
C.
Statistical-based intrusion detection technology
Answers
D.
Intrusion detection technology based on pattern matching
D.
Intrusion detection technology based on pattern matching
Answers
Suggested answer: A, B, C, D

The following describes the guiding principles for information security management Which one is incorrect? (single selection).

A.
Information security requires active defense and comprehensive prevention.
A.
Information security requires active defense and comprehensive prevention.
Answers
B.
It is necessary to comprehensively consider the constraints of social factors on information security.
B.
It is necessary to comprehensively consider the constraints of social factors on information security.
Answers
C.
It is necessary to clarify the responsibilities and verifiability of countries, enterprises and individuals for information security.
C.
It is necessary to clarify the responsibilities and verifiability of countries, enterprises and individuals for information security.
Answers
D.
the principle of reducing complexity in engineering principles is the most privileged mechanism that needs to implement access.
D.
the principle of reducing complexity in engineering principles is the most privileged mechanism that needs to implement access.
Answers
Suggested answer: D

Take the following about

1, Icx.exe-slave 192.168.122.111:4444 192.168.122.128:3389

2, lex -listen 3456 3789

What is the correct understanding? (Multiple selection)

A.
In the second point, the server's port 3456 request is transmitted to port 3389
A.
In the second point, the server's port 3456 request is transmitted to port 3389
Answers
B.
In the second point, the server's port 3789 request is transmitted to port 3456
B.
In the second point, the server's port 3789 request is transmitted to port 3456
Answers
C.
In the first point, forward the data on port 4444 of the server to 192.168.122.128:3389 ±
C.
In the first point, forward the data on port 4444 of the server to 192.168.122.128:3389 ±
Answers
D.
In the first point, forward the server's port 3389 data to 192.168.122.111: 4444
D.
In the first point, forward the server's port 3389 data to 192.168.122.111: 4444
Answers
Suggested answer: B, D

The firewall policy feature supports IPv4, but does not support IPv6 (radio selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Log formats are diverse At present, there is no unified log format standard in the world, and different manufacturers have formulated corresponding log formats (single selection) according to their own needs

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A
Total 276 questions
Go to page: of 28