ExamGecko
Home / Huawei / H12-731_V2.0 / List of questions
Ask Question

Huawei H12-731_V2.0 Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

Which of the following options is required by Security Manager in Graded Protection 2.0 (multiselect

Audit management
Audit management
Grading and filing
Grading and filing
Centralized control
Centralized control
System administration
System administration
Suggested answer: A, C, D
asked 18/09/2024
Gerald Saraci
42 questions

Question 62

Report Export Collapse

What should I do when my personal privacy information is violated or leaked (multiple choices)?

Obtain privacy information of infringers and warn them.
Obtain privacy information of infringers and warn them.
Self-help measures Require the infringer to stop the infringement
Self-help measures Require the infringer to stop the infringement
Filing a lawsuit in the people's court
Filing a lawsuit in the people's court
Call the police and ask the public security organs to deal with it.
Call the police and ask the public security organs to deal with it.
Suggested answer: A, C, D
asked 18/09/2024
Suraj Porwal
43 questions

Question 63

Report Export Collapse

Anonymization or pseudonymization of personal data reduces the risk to data subjects, which of the following basic principles for processing for personal reasons is met?

principle of accuracy
principle of accuracy
The principle of minimization of doctrinal teachings
The principle of minimization of doctrinal teachings
Lawful and proper The principle of transparency
Lawful and proper The principle of transparency
The principle of attribution
The principle of attribution
Suggested answer: B
asked 18/09/2024
matteo vadagnini
49 questions

Question 64

Report Export Collapse

Which of the following options is part of the business security resiliency (multiple choices)?

Establish a secure business environment
Establish a secure business environment
Improve situational awareness and resiliency of your business
Improve situational awareness and resiliency of your business
Build defense-in-depth capabilities for your business
Build defense-in-depth capabilities for your business
Do a good job of protecting the equipment at the point
Do a good job of protecting the equipment at the point
Suggested answer: A, B, C
asked 18/09/2024
Wislon Pereira
41 questions

Question 65

Report Export Collapse

A backdoor is a hacking method that obtains access to a program or system from a relatively stealthy channel But it does not overrule the security controls of the software.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
Maheshkumar Karuppaiah
40 questions

Question 66

Report Export Collapse

In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion data records being compromised. Organizations must follow the principle of which of the following options to keep data safe at all times.

in the file system Data at rest is protected on the database through storage technology
in the file system Data at rest is protected on the database through storage technology
Check database backups regularly
Check database backups regularly
Protection of data in use when using or processing data
Protection of data in use when using or processing data
Protect data in transit as it travels across the network
Protect data in transit as it travels across the network
Suggested answer: A, B, C, D
asked 18/09/2024
Alexander Voronetsky
46 questions

Question 67

Report Export Collapse

Common means of protecting against SYN Flood political attacks are link restriction techniques and link proxy techniques Among them, connection broker technology refers to the detection of TCP connection rate Set the check alarm value to send messages and block attack traffiC.

TRUE
TRUE
FALSE
FALSE
Suggested answer: B
asked 18/09/2024
David Rossi
36 questions

Question 68

Report Export Collapse

Data storage security is part of the customer's overall security program It is also an important part of data center security and organizational security. Which of the following options is important to keep your data storage secure?

Encrypted storage of data
Encrypted storage of data
Ensure data integrity
Ensure data integrity
Data Backup and Recovery
Data Backup and Recovery
Protection against data destruction
Protection against data destruction
Suggested answer: A, B, C, D
asked 18/09/2024
Arash Rind
50 questions

Question 69

Report Export Collapse

Due to the presence of a large number of decoys in the network Attackers will be caught up in an online world where the real is indistinguishable. Attackers often need to spend a lot of time to distinguish the authenticity of information, thereby delaying the attacker's network attack, giving defenders more response time, and reducing the possibility of attackers attacking real systems.

TRUE
TRUE
FALSE
FALSE
Suggested answer: A
asked 18/09/2024
CCF AG Alexander Seidler
37 questions

Question 70

Report Export Collapse

Data destruction refers to the use of various technical means to completely delete the data in computer storage devices, so as to prevent unauthorized users from using residual data to restore the original data information, so as to achieve the purpose of protecting key dat a. Which of the following options is wrong about how data is destroyed?

Storage media such as disk or tape It's all magnetic technology If it can destroy its magnetic structure The existing data no longer exists.
Storage media such as disk or tape It's all magnetic technology If it can destroy its magnetic structure The existing data no longer exists.
In addition to low-level formatting of disks and tapes, it can also be done in the form of physical rhetoric
In addition to low-level formatting of disks and tapes, it can also be done in the form of physical rhetoric
Since tapes can be used repeatedly, data can be destroyed using overwrite. As long as the disk is overwritten once Data cannot be interpreted.
Since tapes can be used repeatedly, data can be destroyed using overwrite. As long as the disk is overwritten once Data cannot be interpreted.
Destruction of the entity's storage media Make the data unreadable by the system It is also one of the ways to ensure the confidentiality and security of data.
Destruction of the entity's storage media Make the data unreadable by the system It is also one of the ways to ensure the confidentiality and security of data.
Suggested answer: D
asked 18/09/2024
Oeurn Chan
31 questions
Total 276 questions
Go to page: of 28
Search

Related questions