ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Which of the following options protects against SMRF attacks?

If the source address of an ICMP request packet is a broadcast address, the packet is discarded
If the source address of an ICMP request packet is a broadcast address, the packet is discarded
If the destination address of an ICMP request packet is a network address, the packet is discarded
If the destination address of an ICMP request packet is a network address, the packet is discarded
If the destination address of an ICMP request packet is a broadcast address, the packet is discarded
If the destination address of an ICMP request packet is a broadcast address, the packet is discarded
If the source address of the ICMP request packet is the host address The message is discarded
If the source address of the ICMP request packet is the host address The message is discarded
Suggested answer: A
asked 18/09/2024
Mike Schatens
36 questions

Question 52

Report Export Collapse

Which of the following options fall under the Security Manager requirements in Graded Protection 2.0?

Grading and filing
Grading and filing
System administration
System administration
Audit management
Audit management
Centralized control
Centralized control
Suggested answer: B, C, D
asked 18/09/2024
Nicola Pinotti
61 questions

Question 53

Report Export Collapse

In general, which level of level of protection requirements does the non-secret-related information system in the county-level unit need to meet?

Autonomous protection level
Autonomous protection level
Guidance on protection levels
Guidance on protection levels
Mandatory protection level
Mandatory protection level
Supervise the level of protection
Supervise the level of protection
Suggested answer: B
asked 18/09/2024
Kaddy Kabuya
54 questions

Question 54

Report Export Collapse

Which of the following options is a pseudonymized method for data?

Tokenization
Tokenization
hash
hash
encrypt
encrypt
Generalization
Generalization
Suggested answer: A, B, C
asked 18/09/2024
Christina Lanaski
42 questions

Question 55

Report Export Collapse

Which of the following actions are considered measures to ensure access control security?

Become a Premium Member for full access
  Unlock Premium Member

Question 56

Report Export Collapse

Anonymization and pseudonymization of data While reducing the risk of data privacy leakage, it will also reduce the availability of data

Become a Premium Member for full access
  Unlock Premium Member

Question 57

Report Export Collapse

Requirements for physical facilities in the computer room in Class Protection 2.0

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

The path by which Trojan files spread

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

How long does the three-level guarantee re-evaluate

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

The General Data Protection Regulation (GDPR) aims to protect personal data, which of the following options are fundamental rights of data subjects (multiple choices)?

Become a Premium Member for full access
  Unlock Premium Member
Total 276 questions
Go to page: of 28

Related questions