ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Related questions











XSS vulnerabilities are injection vulnerabilities formed by sending invalid database commands

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

In the stage of incident response What do the following security personnel need to do? (Selection).

A.
Perform root cause analysis
A.
Perform root cause analysis
Answers
B.
Control events
B.
Control events
Answers
C.
Collect evidence
C.
Collect evidence
Answers
D.
Rebuild the system
D.
Rebuild the system
Answers
Suggested answer: B

Which of the following attacks can be detected by a point device. (Single selection)

A.
Delete the process
A.
Delete the process
Answers
B.
Encrypt malicious traffic
B.
Encrypt malicious traffic
Answers
C.
Password brute force cracking
C.
Password brute force cracking
Answers
D.
User privilege elevation
D.
User privilege elevation
Answers
Suggested answer: C

WAF devices cannot deploy DDoS protection against web websites

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

In the Linux log security settings Which of the following options is included in the user operational log? (multiple selection).

A.
Permission modification
A.
Permission modification
Answers
B.
Account creation
B.
Account creation
Answers
C.
Password modification
C.
Password modification
Answers
D.
Whether the login is successful
D.
Whether the login is successful
Answers
Suggested answer: A, B, C

the electric power and military industry-related industries need to use several levels of equal protection

A.
Guidance xx
A.
Guidance xx
Answers
B.
Supervise xx
B.
Supervise xx
Answers
C.
Mandatory xx
C.
Mandatory xx
Answers
D.
Exclusive control xx
D.
Exclusive control xx
Answers
Suggested answer: D

Explanation:


Total 276 questions
Go to page: of 28