ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network The source IP address matched in the security policy is the private IP address of the user.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Alejandro Rodriguez
35 questions

Question 32

Report Export Collapse

An important purpose of adopting a distributed denial-of-service attack architecture is to isolate network contacts Protect attackers... So that it will not be tracked by the monitoring system while the attack is in progress

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Andrey Zhukovskiy
44 questions

Question 33

Report Export Collapse

Let's see which devices can be used as Huawei CIS (Cybersecurity Intelligence system.). Trapping probes in network security intelligence systems?

firewall
firewall
switchboard
switchboard
router
router
server
server
Suggested answer: A, B
asked 18/09/2024
Liam Harris
56 questions

Question 34

Report Export Collapse

With the prevalence of e-commerce, online banking, e-government The business value of WEB servers is getting higher and higher, and the security threats faced by web servers are also increasing, and the defense against the web application layer has become an inevitable trend, WAF (WebApplication Firewall WEB APPLICATION FIREWALL) PRODUCTS BEGAN TO BECOME POPULAR.

As shown in the figure The firewall uses the deployment mode of transparent proxy About the deployment mode of WAF using transparent proxy Which of the following options is described incorrectly.

Huawei H12-731_V2.0 image Question 34 33333 09182024192841000000

You need to configure the IP address and route for the forwarding interface of the WAF
You need to configure the IP address and route for the forwarding interface of the WAF
The agent works in route-forwarding mode instead of bridge mode
The agent works in route-forwarding mode instead of bridge mode
JUDGING FROM THE ANGULARITY OF THE WEB CLIENT THE WEB CLIENT IS STILL DIRECTLY ACCESSING THE SERVER AND IS NOT AWARE OF THE EXISTENCE OF WAF
JUDGING FROM THE ANGULARITY OF THE WEB CLIENT THE WEB CLIENT IS STILL DIRECTLY ACCESSING THE SERVER AND IS NOT AWARE OF THE EXISTENCE OF WAF
Minimal network changes enable zero-configuration deployment
Minimal network changes enable zero-configuration deployment
Suggested answer: A
asked 18/09/2024
Frank Acosta
46 questions

Question 35

Report Export Collapse

The web reputation feature categorizes websites and differentiates them according to different classifications. When a user visits a potentially risky website, it can be promptly alerted or blocked by the system β€’ thus helping the user quickly confirm the security of the target website. Which of the following options does not fall under the classification of Web Reputation Sites?

Default trusted Web site
Default trusted Web site
Customize trusted websites
Customize trusted websites
Customize the suspicious station
Customize the suspicious station
Predefined trusted websites
Predefined trusted websites
Suggested answer: A
asked 18/09/2024
Armands Vestmanis
50 questions

Question 36

Report Export Collapse

With the continuous development of network technology The firewall is also completing its own upgrade The technology evolution that firewalls have undergone includes which of the following options

Stateful Detection Firewall
Stateful Detection Firewall
App Proxy Firewall
App Proxy Firewall
Packet filtering firewall
Packet filtering firewall
Web firewall
Web firewall
Suggested answer: A, B, C
asked 18/09/2024
Matias Cordero Ochoa
37 questions

Question 37

Report Export Collapse

NIP provides security mechanisms from multiple levels such as administrators and logs to build the security of operation and maintenance Which of the following security options are included?

Administrator decentralization and domain management mechanism
Administrator decentralization and domain management mechanism
Anti-brute force mechanism
Anti-brute force mechanism
Protection mechanism for sensitive user information
Protection mechanism for sensitive user information
Access channel control
Access channel control
Suggested answer: A, B, C, D
asked 18/09/2024
John Bascara
40 questions

Question 38

Report Export Collapse

PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion processes, usually orchestrated by certain personnel For specific goals.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
EDDIE LIN
49 questions

Question 39

Report Export Collapse

Employees visit illegal or malicious websites at will Viruses, Trojans, and worms will be attacked, so we need to enable URL filtering. Which of the following options is a feature of URL Shopping?

Great impact on performance However, only HTTP/HTTPS access is controlled
Great impact on performance However, only HTTP/HTTPS access is controlled
The impact on performance is small And all services corresponding to the domain name can be controlled
The impact on performance is small And all services corresponding to the domain name can be controlled
Control in the domain name resolution stage, control the granularity Control can only be done down to the domain name level
Control in the domain name resolution stage, control the granularity Control can only be done down to the domain name level
Control is performed during the URL request phase of making HTTP/HTTPs Fine control granularityCan be controlled down to the directory and file level
Control is performed during the URL request phase of making HTTP/HTTPs Fine control granularityCan be controlled down to the directory and file level
Suggested answer: A, D
asked 18/09/2024
Nqobile Nxumalo
46 questions

Question 40

Report Export Collapse

Trojans due to infection of other files It also destroys computer systems, and at the same time replicates itself, so Trojans have the characteristics of traditional computer viruses.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Steve Jenkins-Thorkildson
49 questions
Total 276 questions
Go to page: of 28
Search

Related questions