ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 26

Question list
Search
Search

Related questions











Which of the following options are part of the Internet Behavior? (multiple selection).

A.
Keywords that users search for using search engines
A.
Keywords that users search for using search engines
Answers
B.
Sending and receiving emails
B.
Sending and receiving emails
Answers
C.
User QQ account and its online and offline time
C.
User QQ account and its online and offline time
Answers
D.
User profiles
D.
User profiles
Answers
Suggested answer: A, B, C

Which of the following behaviors does not pose an information security risk. (Single selection)

A.
Close unnecessary host ports
A.
Close unnecessary host ports
Answers
B.
Misoperation
B.
Misoperation
Answers
C.
Important files are not encrypted
C.
Important files are not encrypted
Answers
D.
Connect to public WIFI
D.
Connect to public WIFI
Answers
Suggested answer: A

Which of the following is not part of the changing trend in cyberattacks? (Single selection)

A.
Physicalization of attack methods
A.
Physicalization of attack methods
Answers
B.
Complication of attack methods
B.
Complication of attack methods
Answers
C.
The attack method changes little
C.
The attack method changes little
Answers
D.
Diversification of attack objectives
D.
Diversification of attack objectives
Answers
Suggested answer: C

Which of the following options is used to obtain information in penetration testing? (single selection).

A.
Connect to open ports Log in to the server
A.
Connect to open ports Log in to the server
Answers
B.
Exploit the vulnerability to implant a backdoor into the host
B.
Exploit the vulnerability to implant a backdoor into the host
Answers
C.
Use the tool to scan the port open by the server?
C.
Use the tool to scan the port open by the server?
Answers
D.
Extract super administrator permissions for ordinary users.
D.
Extract super administrator permissions for ordinary users.
Answers
Suggested answer: C

Which of the following options allows complete destruction of data, (multiple selection)

A.
Degaussing method
A.
Degaussing method
Answers
B.
Multiple divisions
B.
Multiple divisions
Answers
C.
Overwriting
C.
Overwriting
Answers
D.
Mashing method
D.
Mashing method
Answers
Suggested answer: A, C, D

The trap configuration of the switching machine is as follows: deception deception enable deception detect-network id 1 192.168.1.0 255.255.255.0 deception detect-network id 1 192.168.2.0 255.255.255.0 deception decoy destination 192.0.2.100 Which of the following descriptions of this configuration is correct? (single selection).

A.
The IP address used by the Ax deception decoy destination to configure the trapping probe
A.
The IP address used by the Ax deception decoy destination to configure the trapping probe
Answers
B.
The Deception Detect-Network ID is used to configure the detection network for trapping
B.
The Deception Detect-Network ID is used to configure the detection network for trapping
Answers
C.
Deception Enable should be configured under the interface.
C.
Deception Enable should be configured under the interface.
Answers
D.
Deception is used to turn on the device's trapping function
D.
Deception is used to turn on the device's trapping function
Answers
Suggested answer: B

The following describes the service identification Which item ? (single selection) is wrong

A.
Service identification is a reconnaissance technique that identifies the type of service provided by the server.
A.
Service identification is a reconnaissance technique that identifies the type of service provided by the server.
Answers
B.
The SSH protocol will actively inform visitors of their version information.
B.
The SSH protocol will actively inform visitors of their version information.
Answers
C.
An attacker can retrieve the relevant hole according to the service version and exploit it.
C.
An attacker can retrieve the relevant hole according to the service version and exploit it.
Answers
D.
The identification of all services can be achieved through port scanning technology.
D.
The identification of all services can be achieved through port scanning technology.
Answers
Suggested answer: D

Formatting your computer means that the files have been completely erased Unable to fix.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The sandbox cannot link the anti-virus with which of the following devices, (single selection).

A.
Firewall
A.
Firewall
Answers
B.
switchboard
B.
switchboard
Answers
C.
Router
C.
Router
Answers
D.
CIS
D.
CIS
Answers
Suggested answer: C

Which of the following is not a virus exemption method? (single selection).

A.
Modify system files
A.
Modify system files
Answers
B.
Parasitic in macro files
B.
Parasitic in macro files
Answers
C.
Modify the memory signature
C.
Modify the memory signature
Answers
D.
Modify the file signature
D.
Modify the file signature
Answers
Suggested answer: B
Total 276 questions
Go to page: of 28