ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Which of the following options protects against SMRF attacks?

If the source address of an ICMP request packet is a broadcast address, the packet is discarded
If the source address of an ICMP request packet is a broadcast address, the packet is discarded
If the destination address of an ICMP request packet is a network address, the packet is discarded
If the destination address of an ICMP request packet is a network address, the packet is discarded
If the destination address of an ICMP request packet is a broadcast address, the packet is discarded
If the destination address of an ICMP request packet is a broadcast address, the packet is discarded
If the source address of the ICMP request packet is the host address The message is discarded
If the source address of the ICMP request packet is the host address The message is discarded
Suggested answer: A
asked 18/09/2024
Mike Schatens
37 questions

Question 52

Report Export Collapse

Which of the following options fall under the Security Manager requirements in Graded Protection 2.0?

Grading and filing
Grading and filing
System administration
System administration
Audit management
Audit management
Centralized control
Centralized control
Suggested answer: B, C, D
asked 18/09/2024
Nicola Pinotti
61 questions

Question 53

Report Export Collapse

In general, which level of level of protection requirements does the non-secret-related information system in the county-level unit need to meet?

Autonomous protection level
Autonomous protection level
Guidance on protection levels
Guidance on protection levels
Mandatory protection level
Mandatory protection level
Supervise the level of protection
Supervise the level of protection
Suggested answer: B
asked 18/09/2024
Kaddy Kabuya
54 questions

Question 54

Report Export Collapse

Which of the following options is a pseudonymized method for data?

Tokenization
Tokenization
hash
hash
encrypt
encrypt
Generalization
Generalization
Suggested answer: A, B, C
asked 18/09/2024
Christina Lanaski
43 questions

Question 55

Report Export Collapse

Which of the following actions are considered measures to ensure access control security?

Encrypt the storage key
Encrypt the storage key
Back up data information
Back up data information
Set up network isolation
Set up network isolation
Set the session timeout
Set the session timeout
Suggested answer: C, D
asked 18/09/2024
Carlos Eduardo Araujo Fonseca
45 questions

Question 56

Report Export Collapse

Anonymization and pseudonymization of data While reducing the risk of data privacy leakage, it will also reduce the availability of data

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
Carl James Carampot
44 questions

Question 57

Report Export Collapse

Requirements for physical facilities in the computer room in Class Protection 2.0

Intrusion prevention
Intrusion prevention
Electromagnetic protection
Electromagnetic protection
Personnel authorization
Personnel authorization
Suggested answer: B
asked 18/09/2024
Daniel Martos
47 questions

Question 58

Report Export Collapse

The path by which Trojan files spread

mailbox
mailbox
Instant messaging
Instant messaging
U disk
U disk
X
X
Suggested answer: A, B, C
asked 18/09/2024
Oleksandr Kondratchuk
38 questions

Question 59

Report Export Collapse

How long does the three-level guarantee re-evaluate

Half
Half
- years
- years
2 years
2 years
Suggested answer: B
asked 18/09/2024
Padmavathi Jawaharlal
41 questions

Question 60

Report Export Collapse

The General Data Protection Regulation (GDPR) aims to protect personal data, which of the following options are fundamental rights of data subjects (multiple choices)?

Control
Control
Weak expulsion
Weak expulsion
Right of Access
Right of Access
Right to information
Right to information
Suggested answer: B, C, D
asked 18/09/2024
Juy Juy
49 questions
Total 276 questions
Go to page: of 28

Related questions