ExamGecko
Home Home / Huawei / H12-731_V2.0

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 7

Question list
Search
Search

List of questions

Search

Related questions











Which of the following options is required by Security Manager in Graded Protection 2.0 (multiselect

A.
Audit management
A.
Audit management
Answers
B.
Grading and filing
B.
Grading and filing
Answers
C.
Centralized control
C.
Centralized control
Answers
D.
System administration
D.
System administration
Answers
Suggested answer: A, C, D

What should I do when my personal privacy information is violated or leaked (multiple choices)?

A.
Obtain privacy information of infringers and warn them.
A.
Obtain privacy information of infringers and warn them.
Answers
B.
Self-help measures Require the infringer to stop the infringement
B.
Self-help measures Require the infringer to stop the infringement
Answers
C.
Filing a lawsuit in the people's court
C.
Filing a lawsuit in the people's court
Answers
D.
Call the police and ask the public security organs to deal with it.
D.
Call the police and ask the public security organs to deal with it.
Answers
Suggested answer: A, C, D

Anonymization or pseudonymization of personal data reduces the risk to data subjects, which of the following basic principles for processing for personal reasons is met?

A.
principle of accuracy
A.
principle of accuracy
Answers
B.
The principle of minimization of doctrinal teachings
B.
The principle of minimization of doctrinal teachings
Answers
C.
Lawful and proper The principle of transparency
C.
Lawful and proper The principle of transparency
Answers
D.
The principle of attribution
D.
The principle of attribution
Answers
Suggested answer: B

Which of the following options is part of the business security resiliency (multiple choices)?

A.
Establish a secure business environment
A.
Establish a secure business environment
Answers
B.
Improve situational awareness and resiliency of your business
B.
Improve situational awareness and resiliency of your business
Answers
C.
Build defense-in-depth capabilities for your business
C.
Build defense-in-depth capabilities for your business
Answers
D.
Do a good job of protecting the equipment at the point
D.
Do a good job of protecting the equipment at the point
Answers
Suggested answer: A, B, C

A backdoor is a hacking method that obtains access to a program or system from a relatively stealthy channel But it does not overrule the security controls of the software.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion data records being compromised. Organizations must follow the principle of which of the following options to keep data safe at all times.

A.
in the file system Data at rest is protected on the database through storage technology
A.
in the file system Data at rest is protected on the database through storage technology
Answers
B.
Check database backups regularly
B.
Check database backups regularly
Answers
C.
Protection of data in use when using or processing data
C.
Protection of data in use when using or processing data
Answers
D.
Protect data in transit as it travels across the network
D.
Protect data in transit as it travels across the network
Answers
Suggested answer: A, B, C, D

Common means of protecting against SYN Flood political attacks are link restriction techniques and link proxy techniques Among them, connection broker technology refers to the detection of TCP connection rate Set the check alarm value to send messages and block attack traffiC.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: B

Data storage security is part of the customer's overall security program It is also an important part of data center security and organizational security. Which of the following options is important to keep your data storage secure?

A.
Encrypted storage of data
A.
Encrypted storage of data
Answers
B.
Ensure data integrity
B.
Ensure data integrity
Answers
C.
Data Backup and Recovery
C.
Data Backup and Recovery
Answers
D.
Protection against data destruction
D.
Protection against data destruction
Answers
Suggested answer: A, B, C, D

Due to the presence of a large number of decoys in the network Attackers will be caught up in an online world where the real is indistinguishable. Attackers often need to spend a lot of time to distinguish the authenticity of information, thereby delaying the attacker's network attack, giving defenders more response time, and reducing the possibility of attackers attacking real systems.

A.
TRUE
A.
TRUE
Answers
B.
FALSE
B.
FALSE
Answers
Suggested answer: A

Data destruction refers to the use of various technical means to completely delete the data in computer storage devices, so as to prevent unauthorized users from using residual data to restore the original data information, so as to achieve the purpose of protecting key dat a. Which of the following options is wrong about how data is destroyed?

A.
Storage media such as disk or tape It's all magnetic technology If it can destroy its magnetic structure The existing data no longer exists.
A.
Storage media such as disk or tape It's all magnetic technology If it can destroy its magnetic structure The existing data no longer exists.
Answers
B.
In addition to low-level formatting of disks and tapes, it can also be done in the form of physical rhetoric
B.
In addition to low-level formatting of disks and tapes, it can also be done in the form of physical rhetoric
Answers
C.
Since tapes can be used repeatedly, data can be destroyed using overwrite. As long as the disk is overwritten once Data cannot be interpreted.
C.
Since tapes can be used repeatedly, data can be destroyed using overwrite. As long as the disk is overwritten once Data cannot be interpreted.
Answers
D.
Destruction of the entity's storage media Make the data unreadable by the system It is also one of the ways to ensure the confidentiality and security of data.
D.
Destruction of the entity's storage media Make the data unreadable by the system It is also one of the ways to ensure the confidentiality and security of data.
Answers
Suggested answer: D
Total 276 questions
Go to page: of 28