ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Which of the following options protects against SMRF attacks?

A.
If the source address of an ICMP request packet is a broadcast address, the packet is discarded
A.
If the source address of an ICMP request packet is a broadcast address, the packet is discarded
Answers
B.
If the destination address of an ICMP request packet is a network address, the packet is discarded
B.
If the destination address of an ICMP request packet is a network address, the packet is discarded
Answers
C.
If the destination address of an ICMP request packet is a broadcast address, the packet is discarded
C.
If the destination address of an ICMP request packet is a broadcast address, the packet is discarded
Answers
D.
If the source address of the ICMP request packet is the host address The message is discarded
D.
If the source address of the ICMP request packet is the host address The message is discarded
Answers
Suggested answer: A

Which of the following options fall under the Security Manager requirements in Graded Protection 2.0?

A.
Grading and filing
A.
Grading and filing
Answers
B.
System administration
B.
System administration
Answers
C.
Audit management
C.
Audit management
Answers
D.
Centralized control
D.
Centralized control
Answers
Suggested answer: B, C, D

In general, which level of level of protection requirements does the non-secret-related information system in the county-level unit need to meet?

A.
Autonomous protection level
A.
Autonomous protection level
Answers
B.
Guidance on protection levels
B.
Guidance on protection levels
Answers
C.
Mandatory protection level
C.
Mandatory protection level
Answers
D.
Supervise the level of protection
D.
Supervise the level of protection
Answers
Suggested answer: B

Which of the following options is a pseudonymized method for data?

A.
Tokenization
A.
Tokenization
Answers
B.
hash
B.
hash
Answers
C.
encrypt
C.
encrypt
Answers
D.
Generalization
D.
Generalization
Answers
Suggested answer: A, B, C

Which of the following actions are considered measures to ensure access control security?

A.
Encrypt the storage key
A.
Encrypt the storage key
Answers
B.
Back up data information
B.
Back up data information
Answers
C.
Set up network isolation
C.
Set up network isolation
Answers
D.
Set the session timeout
D.
Set the session timeout
Answers
Suggested answer: C, D

Anonymization and pseudonymization of data While reducing the risk of data privacy leakage, it will also reduce the availability of data

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Requirements for physical facilities in the computer room in Class Protection 2.0

A.
Intrusion prevention
A.
Intrusion prevention
Answers
B.
Electromagnetic protection
B.
Electromagnetic protection
Answers
C.
Personnel authorization
C.
Personnel authorization
Answers
Suggested answer: B

The path by which Trojan files spread

A.
mailbox
A.
mailbox
Answers
B.
Instant messaging
B.
Instant messaging
Answers
C.
U disk
C.
U disk
Answers
D.
X
D.
X
Answers
Suggested answer: A, B, C

How long does the three-level guarantee re-evaluate

A.
Half
A.
Half
Answers
B.
- years
B.
- years
Answers
C.
2 years
C.
2 years
Answers
Suggested answer: B

The General Data Protection Regulation (GDPR) aims to protect personal data, which of the following options are fundamental rights of data subjects (multiple choices)?

A.
Control
A.
Control
Answers
B.
Weak expulsion
B.
Weak expulsion
Answers
C.
Right of Access
C.
Right of Access
Answers
D.
Right to information
D.
Right to information
Answers
Suggested answer: B, C, D
Total 276 questions
Go to page: of 28