Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 28
List of questions
Related questions
XSS vulnerabilities are injection vulnerabilities formed by sending invalid database commands
A.
TRUE
B.
FALSE
In the stage of incident response What do the following security personnel need to do? (Selection).
A.
Perform root cause analysis
B.
Control events
C.
Collect evidence
D.
Rebuild the system
Which of the following attacks can be detected by a point device. (Single selection)
A.
Delete the process
B.
Encrypt malicious traffic
C.
Password brute force cracking
D.
User privilege elevation
WAF devices cannot deploy DDoS protection against web websites
A.
TRUE
B.
FALSE
In the Linux log security settings Which of the following options is included in the user operational log? (multiple selection).
A.
Permission modification
B.
Account creation
C.
Password modification
D.
Whether the login is successful
the electric power and military industry-related industries need to use several levels of equal protection
A.
Guidance xx
B.
Supervise xx
C.
Mandatory xx
D.
Exclusive control xx
Question