Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Note! Huawei has retired the H12-731_V2.0 Exam Contact us through Live Chat or email us for more information.

H12-731_V2.0 HCIE-Security (Written) V2.0 Questions and Answers

Questions 4

The following describes the authorization of the log license Which is correct? (single selection).

Options:

A.

The generation of anti-virus logs has nothing to do with license authorization

B.

The generation of intrusion prevention logs has nothing to do with license authorization

C.

The generation of audit logs has nothing to do with license authorization

D.

Sandbox detection logs include local sandbox and cloud sandbox detection logs, and cloud sandbox detection requires license authorization

Buy Now
Questions 5

Formatting your computer means that the files have been completely erased Unable to fix.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

Which of the following authentication methods is password authentication? (single selection).

Options:

A.

What do you have

B.

What do you do

C.

What you are

D.

What do you know

Buy Now
Questions 7

How long does the three-level guarantee re-evaluate

Options:

A.

Half

B.

- years

C.

2 years

Buy Now
Questions 8

The following describes the security risks caused by ordinary users Which gas single choice is wrong)

Options:

A.

Unauthorized access to business systems unrelated to their own work

B.

The user copies the screen content, My Screen or copied by other unlawful means Download the data library.

C.

Fake user identity query and obtain data resulting in data leakage 5JL

D.

Accidental operation causes the O&M database to be deleted, Destruction.

Buy Now
Questions 9

In • User Login Web Page with User Name and Password Medium The following is about Username" Which one is described correctly? (single selection).

Options:

A.

Identification

B.

Identity authentication

C.

Billing

D.

Authorization

Buy Now
Questions 10

Based on years of deep understanding of customer needs and professional research in security, Huawei launched the Anti-DDoS solution, which does not include which of the following options is less

Options:

A.

Suga Center

B.

Testing Center

C.

Traffic Center

D.

Cleaning center

Buy Now
Questions 11

What are the options for the IPDRR process? (multiple selection).

Options:

A.

Response

B.

Plan

C.

Protection

D.

Recovery

Buy Now
Questions 12

When deploying an Anti-DDos system using bypass, which of the following options is a common drainage method? (single selection).

Options:

A.

BGP drainage

B.

Second-layer drainage

C.

GRE drainage

Buy Now
Questions 13

On the principle of defense against trapping Which of the following is described as incorrect=

Options:

A.

By deceiving network detection activities, fake resources are displayed, so that attackers cannot discover real system information and vulnerabilities

B.

Interact with the attack campaign to confirm the intent and discover the attacker before the breach occurs

C.

Trapping systems discover and block attacker attacks

D.

Interference Attack Gathering System Information diaphragmatic weakness determination" process, inducing the attacker to expose the intention

Buy Now
Questions 14

The global nature of the Internet exposes Teb services to attacks of varying sizes, sizes, and sophistications So which of the following options can secure Web services?

Options:

A.

run IIS Lockdown Wizzard

B.

Install the latest operating system patches

C.

Disable default and management of web sites

D.

Disable network printing

Buy Now
Questions 15

The following describes the service identification Which item ◊ (single selection) is wrong

Options:

A.

Service identification is a reconnaissance technique that identifies the type of service provided by the server.

B.

The SSH protocol will actively inform visitors of their version information.

C.

An attacker can retrieve the relevant hole according to the service version and exploit it.

D.

The identification of all services can be achieved through port scanning technology.

Buy Now
Questions 16

In the Cloudabric scenario, which of the following ways is the firewall deployed?

Options:

A.

One machine deployment

B.

Primary/standby dual-machine images

C.

Dual machine load sharing

D.

Hot standby for both active and standby machines

Buy Now
Questions 17

Which of the following are China's information security standards organizations, multiple selections)

Options:

A.

National Internet Emergency Response Center

B.

Technical Committee on Information Technology Security Standardization

C.

China Association for Work Safety (CAWS).

D.

Network and Information Security Technical Working Committee of China Communications Standards Association (CCSA).

Buy Now
Questions 18

Which of the following options does not reflect the advanced characteristics of APT attacks? (single selection).

Options:

A.

Sending API attacks generally requires the power of large organizations

B.

API attacks follow the course of the cyber attack chain

C.

API attacks are generally more invisible Hide attacks by encrypting channels, for example

D.

Zero-day vulnerabilities are used in API attacks

Buy Now
Questions 19

Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)

Options:

A.

Agile-controller DCN

B.

FireHunter

C.

VSCAN

D.

SecoManager

Buy Now
Questions 20

The SQL injection vulnerability occurs due to the lack of validation of the legitimacy of user input

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Which of the following options is a major cause of business disruption in the cloud? (multiple selection).

Options:

A.

Vulnerabilities

B.

Data breach

C.

Cyber attacks

D.

Viruses

Buy Now
Questions 22

Which of the following attacks can be addressed using cybertrapping? (Single selection)

Options:

A.

DDos

B.

Malformed message attack

C.

TCP port scanning

D.

Oversized ICMP packet attack

Buy Now
Questions 23

Which of the following options is a virtual firewall use case?

Options:

A.

Multi-tenant app environment Enable the virtual firewall to implement an independent port for administrative privileges

B.

Network traffic isolation between VMs is not possible

C.

VPN group and network environment Enable the virtual firewall for forward isolation

D.

Isolation of different security areas of the campus network

Buy Now
Questions 24

In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion data records being compromised. Organizations must follow the principle of which of the following options to keep data safe at all times.

Options:

A.

in the file system Data at rest is protected on the database through storage technology

B.

Check database backups regularly

C.

Protection of data in use when using or processing data

D.

Protect data in transit as it travels across the network

Buy Now
Questions 25

The path by which Trojan files spread

Options:

A.

mailbox

B.

Instant messaging

C.

U disk

D.

X

Buy Now
Questions 26

What is correct in the following description of the capabilities of cybertrapping techniques? (multiple selection).

Options:

A.

Network trapping technology can automatically sense APR-MISS and realize trapping.

B.

Network trapping technology can automatically sense the non-existence of IP and realize trapping.

C.

Network trapping technology can automatically sense the absence of MAC addresses and realize trapping.

D.

Network trapping technology can automatically sense open ports and realize trapping.

Buy Now
Questions 27

Which of the following is not part of the changing trend in cyberattacks? (Single selection)

Options:

A.

Physicalization of attack methods

B.

Complication of attack methods

C.

The attack method changes little

D.

Diversification of attack objectives

Buy Now
Questions 28

L2TP over IPsec combines the advantages of both VPNs to provide secure user access. Which of the following items belongs to What does L2TP do?

Options:

A.

Data integrity verification

B.

User authentication

C.

Data encryption

D.

Address assignment

Buy Now
Questions 29

By configuring the authentication function, it can effectively prevent forgery and tampering attacks against IPv6 routing protocols

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 30

When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ensure the security of user data operations.

Options:

A.

Transmission security

B.

Storage security

C.

Destroy security

D.

Collect security

Buy Now
Questions 31

What are the following descriptions of cybertrapping techniques that are wrong? (multiple selection).

Options:

A.

Trapping needles support simulation services

B.

The trapping technology scheme consists of two parts: trap and trapping probe

C.

The trapping probe is a honeypot

D.

The trapping probe is responsible for identifying the scanning behavior in the network and directing traffic to the trap

Buy Now
Questions 32

In the following description of the principles of network trapping defense, which are correct? (multiple selection).

Options:

A.

Installing threats against network weapons, network trapping defense technology, can use deception to make the attack execute special commands in the trapping system

B.

In the face of viruses, worms, WebShell these weaponized attack methods, can use misleading methods to make the attack traffic be diverted to trap probe O

C.

For the detection behavior in the early stage of the attack, you can use deception to burst into defense. By creating various traps to mislead the attacker. Cause attackers to misunderstand the network structure, attack targets, and vulnerabilities.

D.

Network trapping technology can disguise the actual business and vulnerabilities to mislead the attacker, so that the attacker can infiltrate the trapping system.

Buy Now
Questions 33

Digital certificates can ensure the credibility of the public key of the communicating partner in the process of data transmission.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

The server can set or read the information contained in the cookie This maintains state in the user's session with the server.

A5RUE

B. FALSE

Options:

Buy Now
Questions 35

The purpose of access control is to provide access to authorized subjects and prevent any unauthorized and intentional access.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?

Options:

A.

Destination IP address

B.

Port number

C.

Feature library

D.

Source IP address

Buy Now
Questions 37

Which is the correct order for IPS to process traffic? (single selection).

Options:

A.

Data reorganization, > characteristic matching, > application identification, > corresponding processing

B.

Corresponding processing, data reorganization, > trait matching, application identification

C.

Corresponding treatment, characteristics matching. Application identification, data reorganization

D.

Data reorganization. App recognition. Trait matching. Deal accordingly

Buy Now
Questions 38

Whitelisting may not properly handle complex obfuscation, which could allow attackers to subvert filters and potentially inject SQL language.

Options:

A.

TRLE

B.

FALSE

Buy Now
Questions 39

Which of the following options are part of the Internet Behavior? (multiple selection).

Options:

A.

Keywords that users search for using search engines

B.

Sending and receiving emails

C.

User QQ account and its online and offline time

D.

User profiles

Buy Now
Questions 40

The following describes the network scanning defense technology Which one is wrong? (single selection).

Options:

A.

The trapping probe has a business simulation function.

B.

Firewalls and switch devices can act as trapping probes.

C.

In networking mode where the trap and the trap probe are on the same firewall| CIS and SecoManager are not required for trapping Closed-loop threat linkage can be completed directly through FW.

D.

The trapping system produces a unique fingerprint for each attacker Able to record hacker IP, operating system Information such as browser type, type of attack weapon, etC.

Buy Now
Exam Code: H12-731_V2.0
Exam Name: HCIE-Security (Written) V2.0
Last Update: Mar 21, 2024
Questions: 276