ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 24

Question list
Search
Search

Related questions











Which of the following measures can protect against viruses that spread through zero-day vulnerabilities? (multiple selection).

A.
Partial sandbox
A.
Partial sandbox
Answers
B.
Deploy firewalls
B.
Deploy firewalls
Answers
C.
Use situational awareness technology
C.
Use situational awareness technology
Answers
D.
Deploy missing equipment
D.
Deploy missing equipment
Answers
Suggested answer: A, C

Huawei's network security intelligence system CIS can only be linked with which of the following devices to block viruses?

A.
Firewall
A.
Firewall
Answers
B.
Agile Controller-Campus
B.
Agile Controller-Campus
Answers
C.
SecoManager
C.
SecoManager
Answers
D.
AgileController-DCN
D.
AgileController-DCN
Answers
Suggested answer: A

Zombie networks are used to spread viruses and cannot launch DDos attacks

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The SQL injection vulnerability occurs due to the lack of validation of the legitimacy of user input

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

In the capacity building of the security team, it is generally divided into management positions and technical posts, which of the following are not the key responsibilities of technical positions? (single selection).

A.
Responsible for security vulnerability detection and protection.
A.
Responsible for security vulnerability detection and protection.
Answers
B.
Responsible for organizing the emergency handling of information security emergencies.
B.
Responsible for organizing the emergency handling of information security emergencies.
Answers
C.
Responsible for formulating enterprise-level information security technology planning and technical architecture.
C.
Responsible for formulating enterprise-level information security technology planning and technical architecture.
Answers
D.
Responsible for organizing and carrying out information system security graded protection work
D.
Responsible for organizing and carrying out information system security graded protection work
Answers
Suggested answer: C

Which of the following scenarios is for network intrusion prevention? (multiple selection).

A.
IDC or server cluster frontend.
A.
IDC or server cluster frontend.
Answers
B.
The front end of the firewall for the exit of the corporate network.
B.
The front end of the firewall for the exit of the corporate network.
Answers
C.
Between branches of the company's network interconnection.
C.
Between branches of the company's network interconnection.
Answers
D.
The boundary between the campus network and the Internet?
D.
The boundary between the campus network and the Internet?
Answers
Suggested answer: A, C, D

The following describes the configuration contents of the firewall file filtering feature Which one is wrong, (single selection).

A.
Use the command display current-configuration to display configuration information for the default configuration file itself.
A.
Use the command display current-configuration to display configuration information for the default configuration file itself.
Answers
B.
The administrator should first clarify which types of files need to be purged, and then select the types of files that the device can support Finally, fill in the remaining file types in "Custom extension".
B.
The administrator should first clarify which types of files need to be purged, and then select the types of files that the device can support Finally, fill in the remaining file types in "Custom extension".
Answers
C.
When the default configuration file is referenced by the command line configuration security policy You need to enter the full profile name Otherwise, it cannot be successfully referenced.
C.
When the default configuration file is referenced by the command line configuration security policy You need to enter the full profile name Otherwise, it cannot be successfully referenced.
Answers
D.
Under the command line interface, you can view the configuration information in the default configuration file through the command display profile type url-filter.
D.
Under the command line interface, you can view the configuration information in the default configuration file through the command display profile type url-filter.
Answers
Suggested answer: A

Which options below are the main changes in Equal Protection 2.0 compared to Equal Protection 1.0' (multiple choices).

A.
The classification of general safety requirements is more detailed.
A.
The classification of general safety requirements is more detailed.
Answers
B.
The workflow of equal protection assessment is more detailed.
B.
The workflow of equal protection assessment is more detailed.
Answers
C.
Added expansion requirements.
C.
Added expansion requirements.
Answers
D.
The security requirements of each level are more detailed.
D.
The security requirements of each level are more detailed.
Answers
Suggested answer: A, B, C, D

The following describes the security risks caused by ordinary users Which gas single choice is wrong)

A.
Unauthorized access to business systems unrelated to their own work
A.
Unauthorized access to business systems unrelated to their own work
Answers
B.
The user copies the screen content, My Screen or copied by other unlawful means Download the data library.
B.
The user copies the screen content, My Screen or copied by other unlawful means Download the data library.
Answers
C.
Fake user identity query and obtain data resulting in data leakage 5JL
C.
Fake user identity query and obtain data resulting in data leakage 5JL
Answers
D.
Accidental operation causes the O&M database to be deleted, Destruction.
D.
Accidental operation causes the O&M database to be deleted, Destruction.
Answers
Suggested answer: D

In accordance with the provisions of the National Cybersecurity Law... Private clouds need to comply with the basic requirements of classified information security protection, but do not necessarily need to comply with cloud computing scaling requirements.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B
Total 276 questions
Go to page: of 28