ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 27

Question list
Search
Search

Related questions











If you are deploying a WAF appliance in your network for the first time, which is the correct option for the WAF configuration process sequencing? (single).

1, View logs Understand security events in your network 2, Add protection sites 3, Custom rule groups 4, After going live, the strategy is adjusted

A.
1-2-3-4
A.
1-2-3-4
Answers
B.
3-2-1-4
B.
3-2-1-4
Answers
C.
3-1-2-4.
C.
3-1-2-4.
Answers
D.
1-3-2-4
D.
1-3-2-4
Answers
Suggested answer: A

Which of the following authentication methods is password authentication? (single selection).

A.
What do you have
A.
What do you have
Answers
B.
What do you do
B.
What do you do
Answers
C.
What you are
C.
What you are
Answers
D.
What do you know
D.
What do you know
Answers
Suggested answer: D

The following describes the hot standby of the dual machine What are the wrong items? (multiple selection).

A.
Under the condition that the firewall service interface works at Layer 2 and connects the router upstream and downstream It is recommended to use a staff-sharing network.
A.
Under the condition that the firewall service interface works at Layer 2 and connects the router upstream and downstream It is recommended to use a staff-sharing network.
Answers
B.
Under the condition that the firewall service interface works at Layer 2 and connects the switch upstream and downstream Support staff sharing networking
B.
Under the condition that the firewall service interface works at Layer 2 and connects the switch upstream and downstream Support staff sharing networking
Answers
C.
The firewall service interface works in the case of three-layer, uplink and downlink connection to the router You can use primary/standby networking.
C.
The firewall service interface works in the case of three-layer, uplink and downlink connection to the router You can use primary/standby networking.
Answers
D.
The firewall service interface works under the networking condition of Layer 3, uplink and downlink connecting routers You cannot use load-sharing groups.
D.
The firewall service interface works under the networking condition of Layer 3, uplink and downlink connecting routers You cannot use load-sharing groups.
Answers
Suggested answer: B, D

The Pv6 multicast address range is FE80::/10

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

The following describes the implementation of server IP address planning in the firewall server load balancing function, which are the correct items? (multiple selection).

A.
It cannot be the same as the virtualization server address
A.
It cannot be the same as the virtualization server address
Answers
B.
It cannot be the same as the address of other servers on the Internet
B.
It cannot be the same as the address of other servers on the Internet
Answers
C.
It cannot be the same as the IP address of the server
C.
It cannot be the same as the IP address of the server
Answers
D.
Cannot be intertwined with the outgoing IP address of the FW
D.
Cannot be intertwined with the outgoing IP address of the FW
Answers
Suggested answer: A, C, D

Huawei proposes • Partition Defense Unified Detection - Security Scheme Which of the following partitions requires a summer firewall").

A.
Internet boundaries
A.
Internet boundaries
Answers
B.
Business service area
B.
Business service area
Answers
C.
Office network
C.
Office network
Answers
D.
Core exchange area
D.
Core exchange area
Answers
Suggested answer: A, B, C

Let's take the L2TP over IPSec in the dual-machine scenario What is wrong with the description is the egg? (single selection).

A.
In this scenario, Fireproof will assign an IP address to the client
A.
In this scenario, Fireproof will assign an IP address to the client
Answers
B.
After the L2TF tunnel is established, the user cannot access the Internet normally
B.
After the L2TF tunnel is established, the user cannot access the Internet normally
Answers
C.
The parameters set by the client should match the parameters set on the firewall.
C.
The parameters set by the client should match the parameters set on the firewall.
Answers
D.
The client should initiate a dial-up connection to the virtual address of the dual machine.
D.
The client should initiate a dial-up connection to the virtual address of the dual machine.
Answers
Suggested answer: B

Which of the following options is a major cause of business disruption in the cloud? (multiple selection).

A.
Vulnerabilities
A.
Vulnerabilities
Answers
B.
Data breach
B.
Data breach
Answers
C.
Cyber attacks
C.
Cyber attacks
Answers
D.
Viruses
D.
Viruses
Answers
Suggested answer: A, C, D

If the attacker uses a fake address to launch a TCP flood attack Which of the following defenses is most effective? (single).

A.
Source verification
A.
Source verification
Answers
B.
Fingerprint learning
B.
Fingerprint learning
Answers
C.
Session checking
C.
Session checking
Answers
D.
Load inspection
D.
Load inspection
Answers
Suggested answer: A

The following description of deploying the CIS data ingestation feature is correct? (single selection).

A.
When the log collector transmits logs to the big data platform It is recommended to use SSL Because the SSL method is more secure But the overhead is greater.
A.
When the log collector transmits logs to the big data platform It is recommended to use SSL Because the SSL method is more secure But the overhead is greater.
Answers
B.
By deploying the image function on the stream probe , the Netflow data stream is sent to the big data platform.
B.
By deploying the image function on the stream probe , the Netflow data stream is sent to the big data platform.
Answers
C.
Syslog B aims to normalize before reporting to the big data platform But Netflow B does not normalize.
C.
Syslog B aims to normalize before reporting to the big data platform But Netflow B does not normalize.
Answers
D.
By deploying the spectroscopic function on the flow probe Send information elements to the big data platform.
D.
By deploying the spectroscopic function on the flow probe Send information elements to the big data platform.
Answers
Suggested answer: A
Total 276 questions
Go to page: of 28