Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

Note! Following H12-731_V2.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-731_V2.0 HCIE-Security (Written) V2.0 Questions and Answers

Questions 4

Which of the following is not part of the changing trend in cyberattacks? (Single selection)

Options:

A.

Physicalization of attack methods

B.

Complication of attack methods

C.

The attack method changes little

D.

Diversification of attack objectives

Buy Now
Questions 5

Verify user-provided data in the form of whitelists or blacklists, and construct SQL sentences So that user-supplied data cannot affect the logic of the statement This protects against SQL injection attacks.

Options:

A.

TRUE

B・ FALSE

Buy Now
Questions 6

When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ensure the security of user data operations.

Options:

A.

Transmission security

B.

Storage security

C.

Destroy security

D.

Collect security

Buy Now
Questions 7

The IPS function of Huawei's intrusion prevention device is not controlled by License (radio selection).

As TRUE

B. FALSE

Options:

Buy Now
Questions 8

Digital signature technology can guarantee the credibility of the data source and verify whether the data has been tampered with during transmission. (Single selection)

Options:

A.

B. FALSE

Buy Now
Questions 9

Formatting your computer means that the files have been completely erased Unable to fix.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

Which options below are the main changes in Equal Protection 2.0 compared to Equal Protection 1.0' (multiple choices).

Options:

A.

The classification of general safety requirements is more detailed.

B.

The workflow of equal protection assessment is more detailed.

C.

Added expansion requirements.

D.

The security requirements of each level are more detailed.

Buy Now
Questions 11

Which of the following options allows complete destruction of data, (multiple selection)

Options:

A.

Degaussing method

B.

Multiple divisions

C.

Overwriting

D.

Mashing method

Buy Now
Questions 12

The following describes the hot standby of the dual machine What are the wrong items? (multiple selection).

Options:

A.

Under the condition that the firewall service interface works at Layer 2 and connects the router upstream and downstream It is recommended to use a staff-sharing network.

B.

Under the condition that the firewall service interface works at Layer 2 and connects the switch upstream and downstream Support staff sharing networking

C.

The firewall service interface works in the case of three-layer, uplink and downlink connection to the router You can use primary/standby networking.

D.

The firewall service interface works under the networking condition of Layer 3, uplink and downlink connecting routers You cannot use load-sharing groups.

Buy Now
Questions 13

Which of the following services are security management services in HUAWEI CLOUD solutions?

Options:

A.

DDOS Anti-DDoS Pro IP services

B.

Situational awareness services

C.

SSL certificate management service

D.

Security Expert Services

Buy Now
Questions 14

If the attributes of the file all match the match conditions of the rule Then this file successfully matches the rules for the file to be overmixed with the poppy file. If one of the conditions does not match • The next rule continues to be matched, and so on If all the rules do not match FW will discard the file o (single selection).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

When using server authentication Before visiting the business, the visitor first logs in through the client or potal authentication page The firewall then proactively obtains the user's login information (including the username and IP address used by the visitor) from the server (single selection).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Which of the following options is a virtual firewall use case?

Options:

A.

Multi-tenant app environment Enable the virtual firewall to implement an independent port for administrative privileges

B.

Network traffic isolation between VMs is not possible

C.

VPN group and network environment Enable the virtual firewall for forward isolation

D.

Isolation of different security areas of the campus network

Buy Now
Questions 17

Let's take the L2TP over IPSec in the dual-machine scenario What is wrong with the description is the egg? (single selection).

Options:

A.

In this scenario, Fireproof will assign an IP address to the client

B.

After the L2TF tunnel is established, the user cannot access the Internet normally

C.

The parameters set by the client should match the parameters set on the firewall.

D.

The client should initiate a dial-up connection to the virtual address of the dual machine.

Buy Now
Questions 18

Which of the following options fall under the Security Manager requirements in Graded Protection 2.0? A Grading and filing

B. System administration

C. Audit management

D. Centralized control

Options:

Buy Now
Questions 19

Which services in HUAWEI CLOUD solutions can data encryption be applied?

Options:

A.

Cloud host security

B.

Situational awareness services

C.

Database security

D.

Vulnerability scanning service

Buy Now
Questions 20

In the following description of the principles of network trapping defense, which are correct? (multiple selection).

Options:

A.

Installing threats against network weapons, network trapping defense technology, can use deception to make the attack execute special commands in the trapping system

B.

In the face of viruses, worms, WebShell these weaponized attack methods, can use misleading methods to make the attack traffic be diverted to trap probe O

C.

For the detection behavior in the early stage of the attack, you can use deception to burst into defense. By creating various traps to mislead the attacker. Cause attackers to misunderstand the network structure, attack targets, and vulnerabilities.

D.

Network trapping technology can disguise the actual business and vulnerabilities to mislead the attacker, so that the attacker can infiltrate the trapping system.

Buy Now
Questions 21

The signature filter will batch out signatures, and usually set to a uniform action for ease of management. If an app wants to treat it differently You can also use exception signatures to match O's from signature filters

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Which of the following is not a virus exemption method? (single selection).

Options:

A.

Modify system files

B.

Parasitic in macro files

C.

Modify the memory signature

D.

Modify the file signature

Buy Now
Questions 23

The following describes how to create a trap account Which one is correct? (single selection).

Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits

Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits

Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits

D. Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits

Options:

Buy Now
Questions 24

If you want to intelligently select traffic for the source IP address, you can use which of the following intelligent routing methods^ (single selection).

Options:

A.

Global traffic steering strategy

B.

Policy routing and routing

C.

ISProuting

D.

Health check

Buy Now
Questions 25

The following describes FW's application behavior control features Which one is correct? (single selection).

Options:

A.

For FTP behavior, application behavior control can limit the size of upload/download files, but cannot control the upload/download line separately

B.

For IM behavior You can set a black whitelist The priority relationship between the black and white list and the provincial action is: blacklist, white list, default action.

C.

When creating a security strategy Application behavior control and yellow files can be combined with users, time periods, and other objects to achieve the purpose of application control for different users and different time periods.

D.

D. For HTTP behavior The application behavior control function can be controlled by DET operation in POST.

Buy Now
Questions 26

Which of the following options is a pseudonymized method for data?

Options:

A.

Tokenization

B.

hash

C.

encrypt

D . Generalization

Buy Now
Questions 27

The following is a description of traceability audits Which one is correct? (single selection).

Options:

A.

In a networking environment where the packet return path is inconsistent, the content of the audit log record is not complete.

B.

Only audit administrators can configure audit functions and view audit logs

C.

In the security policy, traffic configured as deny will be processed by the audit policy.

D.

The audit strategy includes two parts: conditions and actions By matching any of the conditions, a response action can be performed.

Buy Now
Questions 28

Categorize vulnerabilities by common ways Which of the following types of vulnerabilities should XSS fall into? (single selection).

Options:

A.

Host vulnerabilities

B.

Middleware vulnerabilities

C.

Database vulnerabilities

Buy Now
Questions 29

A description of the following IPv6 Secure Neighbor Discovery feature information for one of the interfaces Which one is wrong?

Options:

A.

The interface does not have strict security mode enabled

B.

The maximum key length that the interface can accept is 2048

C.

The minimum key length that the interface can accept is 512

D.

The security level of the CGA address is 1

Buy Now
Questions 30

The following describes the network layer protection plan for HUAWEI CLOUD security architecture Which one is incorrect? (single selection).

Options:

A.

Tenants can be isolated through security group networks.

B.

Fire protection is implemented between HUAWEI CLOUD and the customer network

C.

Cloud network perimeter protection DDos can only be achieved by deploying anti-DDoS appliances.

D.

The cloud network boundary protects service availability through DDos defense.

Buy Now
Questions 31

If the database O&M workload is much greater than the host O&M workload, you can choose to have an independent department outside the original O&M bastion host

The database bastion host.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

In the capacity building of the security team, it is generally divided into management positions and technical posts, which of the following are not the key responsibilities of technical positions? (single selection).

Options:

A.

Responsible for security vulnerability detection and protection.

B.

Responsible for organizing the emergency handling of information security emergencies.

C.

Responsible for formulating enterprise-level information security technology planning and technical architecture.

D.

Responsible for organizing and carrying out information system security graded protection work

Buy Now
Questions 33

Which of the following behaviors does not pose an information security risk. (Single selection)

Options:

A.

Close unnecessary host ports

B.

Misoperation

C.

Important files are not encrypted

D.

Connect to public WIFI

Buy Now
Questions 34

The following is a humble description of transparent and reverse proxies Which items are correct? (multiple selection).

Options:

A.

The deployment method of reverse proxy requires directing traffic to the WAF device.

B.

The deployment method of transparent proxy requires directing traffic to the WAF device.

C.

The deployment method of transparent proxy is to connect devices in the network.

D.

The deployment method of reverse proxy is to connect devices in the network.

Buy Now
Questions 35

How does the following not belong to the firewall to detect viruses? (single selection).

Options:

A.

Heuristic detection technology

B.

First package detection technology

C.

Malicious domain name detection technology

D.

Document reputation detection technology

Buy Now
Questions 36

in the architecture of software-defined security Which of the following feature descriptions is correct?

Options:

A.

Security resources that can be pooled with features Security functions can be divided and combined, and elastically scalable

B.

The functional interface should provide northbound API interfaces to meet the requirements of flexible service configuration

C.

The security resource pool that carries the security business function can be a hardware resource pool or a software resource pool

D.

Need to provide rich security functions to meet the needs of the business

Buy Now
Questions 37

In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion data records being compromised. Organizations must follow the principle of which of the following options to keep data safe at all times.

Options:

A.

in the file system Data at rest is protected on the database through storage technology

B.

Check database backups regularly

C.

Protection of data in use when using or processing data

D.

Protect data in transit as it travels across the network

Buy Now
Questions 38

The following describes the role of logs Which one is wrong? (single selection).

Options:

A.

Attack traceability

B.

Log storage

C.

Virus blockade

D.

O&M failure analysis

Buy Now
Questions 39

The main role of the audit system is to audit security events after the fact To provide sufficient evidence, a security audit product must have which of the following features7

Options:

A.

Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation

B.

It can provide fine-grained access control to maximize the security of user resources

C.

It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account

D.

It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise

Buy Now
Questions 40

Which of the following health check descriptions is correct? (Selection)

Options:

A.

You do not need to configure a security policy to allow health check packets.

B.

The outbound interface of the probe message does not need to be fixed

C.

After specifying the junction of the link health check The outgoing interface of the health probe packet can be consistent with the incoming interface of the response packet.

D.

When configuring the protocol and port of the health check, check whether the corresponding protocol and port are enabled on the peer side.

Buy Now
Questions 41

In • User Login Web Page with User Name and Password Medium The following is about Username" Which one is described correctly? (single selection).

Options:

A.

Identification

B.

Identity authentication

C.

Billing

D.

Authorization

Buy Now
Exam Code: H12-731_V2.0
Exam Name: HCIE-Security (Written) V2.0
Last Update: Mar 21, 2024
Questions: 276