ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











Figure 1 shows the raw data table Figure 2 shows the data processed by K•anonymization technology, what is the K value of the processing? (Selection).

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: D

Right to request rectification by the data controller Which right of the data subject does the data subject belong to the completion of inaccurate/incomplete personal data? (single selection).

A.
Right of Access
A.
Right of Access
Answers
B.
Right to Measure and Remove
B.
Right to Measure and Remove
Answers
C.
Right to Correction
C.
Right to Correction
Answers
D.
Right to know
D.
Right to know
Answers
Suggested answer: C

The significance of information security standards is to provide an overall level of security Optimize security resource allocation (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which of the following can be guaranteed by K anonymization technology? (multiple selection).

A.
Lack of diversity of sensitive data .
A.
Lack of diversity of sensitive data .
Answers
B.
The attacker cannot determine who a piece of data corresponds to
B.
The attacker cannot determine who a piece of data corresponds to
Answers
C.
An attacker cannot infer whether a person is in the public data.
C.
An attacker cannot infer whether a person is in the public data.
Answers
D.
The attacker cannot confirm whether there is a sensitive attribute
D.
The attacker cannot confirm whether there is a sensitive attribute
Answers
Suggested answer: B, C, D

For the cloud Grade Protection Assessment, which of the following steps marks the end of the Grade Protection Assessment work? (single selection).

A.
System rating
A.
System rating
Answers
B.
System ICP
B.
System ICP
Answers
C.
Construction rectification
C.
Construction rectification
Answers
D.
Grade evaluation
D.
Grade evaluation
Answers
Suggested answer: D

PROTECTION AGAINST SLOW ATTACKS IN DDOS Anti-DDoS solutions with intelligent and anthropomorphic functions are better at defending against such attacks (single selection).

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Which of the following attack methods of 24L can be used in the strike phase of the cyber attack chain? (multiple selection).

A.
DoS attacks
A.
DoS attacks
Answers
B.
Virus attack
B.
Virus attack
Answers
C.
IP packet attack with routing record entries
C.
IP packet attack with routing record entries
Answers
D.
Drag the library
D.
Drag the library
Answers
Suggested answer: A, B, D

What are the options for the IPDRR process? (multiple selection).

A.
Response
A.
Response
Answers
B.
Plan
B.
Plan
Answers
C.
Protection
C.
Protection
Answers
D.
Recovery
D.
Recovery
Answers
Suggested answer: A, C, D

The following is a humble description of transparent and reverse proxies Which items are correct?

(multiple selection).

A.
The deployment method of reverse proxy requires directing traffic to the WAF device.
A.
The deployment method of reverse proxy requires directing traffic to the WAF device.
Answers
B.
The deployment method of transparent proxy requires directing traffic to the WAF device.
B.
The deployment method of transparent proxy requires directing traffic to the WAF device.
Answers
C.
The deployment method of transparent proxy is to connect devices in the network.
C.
The deployment method of transparent proxy is to connect devices in the network.
Answers
D.
The deployment method of reverse proxy is to connect devices in the network.
D.
The deployment method of reverse proxy is to connect devices in the network.
Answers
Suggested answer: A, C

The following describes port scanning Which is wrong? (single selection).

A.
TCP port scanning uses the three-way handshake feature
A.
TCP port scanning uses the three-way handshake feature
Answers
B.
The purpose of port scanning is to determine what kind of services are enabled on the peer host, so as to find an entry for intrusion.
B.
The purpose of port scanning is to determine what kind of services are enabled on the peer host, so as to find an entry for intrusion.
Answers
C.
When the scanner sends a Syn message If the peer does not reply, the peer port is down.
C.
When the scanner sends a Syn message If the peer does not reply, the peer port is down.
Answers
D.
For UDP port scanning It is to determine whether the port is open by sending a UDP data packet to the peer with a specific port number and observing whether the ICMP port is unreachable packet.
D.
For UDP port scanning It is to determine whether the port is open by sending a UDP data packet to the peer with a specific port number and observing whether the ICMP port is unreachable packet.
Answers
Suggested answer: C
Total 276 questions
Go to page: of 28