Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-731_V2.0 has been withdrawn.

H12-731_V2.0 Practice Exam Questions with Answers HCIE-Security (Written) V2.0 Certification

Question # 6

The following is a description of traceability audits Which one is correct? (single selection).

A.

In a networking environment where the packet return path is inconsistent, the content of the audit log record is not complete.

B.

Only audit administrators can configure audit functions and view audit logs

C.

In the security policy, traffic configured as deny will be processed by the audit policy.

D.

The audit strategy includes two parts: conditions and actions By matching any of the conditions, a response action can be performed.

Full Access
Question # 7

Figure 1 shows the raw data table Figure 2 shows the data processed by K•anonymization technology, what is the K value of the processing? (Selection).

H12-731_V2.0 question answer

A.

1

B.

2

C.

3

D.

D. 4

Full Access
Question # 8

NIP provides security mechanisms from multiple levels such as administrators and logs to build the security of operation and maintenance Which of the following security options are included?

A.

Administrator decentralization and domain management mechanism

B.

Anti-brute force mechanism

C.

Protection mechanism for sensitive user information

D.

Access channel control

Full Access
Question # 9

Which of the following is not a virus exemption method? (single selection).

A.

Modify system files

B.

Parasitic in macro files

C.

Modify the memory signature

D.

Modify the file signature

Full Access
Question # 10

Let's take the L2TP over IPSec in the dual-machine scenario What is wrong with the description is the egg? (single selection).

A.

In this scenario, Fireproof will assign an IP address to the client

B.

After the L2TF tunnel is established, the user cannot access the Internet normally

C.

The parameters set by the client should match the parameters set on the firewall.

D.

The client should initiate a dial-up connection to the virtual address of the dual machine.

Full Access
Question # 11

Which of the following options is a major cause of business disruption in the cloud? (multiple selection).

A.

Vulnerabilities

B.

Data breach

C.

Cyber attacks

D.

Viruses

Full Access
Question # 12

The following describes FW's application behavior control features Which one is correct? (single selection).

A.

For FTP behavior, application behavior control can limit the size of upload/download files, but cannot control the upload/download line separately

B.

For IM behavior You can set a black whitelist The priority relationship between the black and white list and the provincial action is: blacklist, white list, default action.

C.

When creating a security strategy Application behavior control and yellow files can be combined with users, time periods, and other objects to achieve the purpose of application control for different users and different time periods.

D.

D. For HTTP behavior The application behavior control function can be controlled by DET operation in POST.

Full Access
Question # 13

Huawei's Sec Insight system comes with the function of stream pin.

A.

TRUE

B.

FALSE

Full Access
Question # 14

In the capacity building of the security team, it is generally divided into management positions and technical posts, which of the following are not the key responsibilities of technical positions? (single selection).

A.

Responsible for security vulnerability detection and protection.

B.

Responsible for organizing the emergency handling of information security emergencies.

C.

Responsible for formulating enterprise-level information security technology planning and technical architecture.

D.

Responsible for organizing and carrying out information system security graded protection work

Full Access
Question # 15

Whitelisting may not properly handle complex obfuscation, which could allow attackers to subvert filters and potentially inject SQL language.

A.

TRLE

B.

FALSE

Full Access
Question # 16

Which of the following does HiSec Insight's big data processing not include?

A.

Data preprocessing

B.

Flow data collection

C.

Distributed storage

D.

Distributed indexes

Full Access
Question # 17

With the continuous development of network technology The firewall is also completing its own upgrade The technology evolution that firewalls have undergone includes which of the following options

A.

Stateful Detection Firewall

B.

App Proxy Firewall

C.

Packet filtering firewall

D.

Web firewall

Full Access
Question # 18

When the Abnormal Traffic Inspection & Control System^ defense strategy of the Abnormal Traffic Monitoring System ATIC selects the anti-uninstall action, it utilizes the status code (targeted) for which of the following options GET request method redirection) to prove the true identity of the client?

A.

300

B.

301

C.

303

D.

302

Full Access
Question # 19

Which of the following options is primarily detected by Threat Detection Services (MTD)?

A.

CTS full logs

B.

Unified Authentication Service (IAM) full logs

C.

Full volumes of Cloud Resolution Service (DNS) logs

D.

Security Guard Device Logs

Full Access
Question # 20

Which options below are the main changes in Equal Protection 2.0 compared to Equal Protection 1.0' (multiple choices).

A.

The classification of general safety requirements is more detailed.

B.

The workflow of equal protection assessment is more detailed.

C.

Added expansion requirements.

D.

The security requirements of each level are more detailed.

Full Access
Question # 21

The trap configuration of the switching machine is as follows:

deception

deception enable

deception detect-network id 1 192.168.1.0 255.255.255.0

deception detect-network id 1 192.168.2.0 255.255.255.0

deception decoy destination 192.0.2.100

Which of the following descriptions of this configuration is correct? (single selection).

The IP address used by the Ax deception decoy destination to configure the trapping probe

B. The Deception Detect-Network ID is used to configure the detection network for trapping

C. Deception Enable should be configured under the interface.

D. Deception is used to turn on the device's trapping function

Full Access
Question # 22

Common database security audit techniques according to technical characteristics What are the categories that can be divided into? (multiple selection).

A.

Agent-based audit technology

B.

Log-based estimation technology

C.

Gateway-based audit technology

D.

Audit technology based on network monitoring

Full Access
Question # 23

Which of the following parameters is included in the DNS request routing method in the firewall DNS transparent proxy?

A global traffic steering strategy

B. Normal static or dynamic routing routing is selected

C. Policy routing routing is routed

D. The intelligent traffic steering mode configured by the DNS transparent proxy itself

Full Access
Question # 24

About Huawei's firewall defense technology against SYN Flood Which of the following options is correctly described?

A.

The limiting method of limiting the number of TCP half-open connections can prevent SYN Flood political attacks

B.

Through SYN Cookie technology, SYN Flood can be prevented

C.

By purchasing inter-domain security policies, SYN Flood attacks can be prevented

D.

The TCP new connection rate limiting method protects against SYN Flood attacks

Full Access
Question # 25

When deploying an Anti-DDos system using bypass, which of the following options is a common drainage method? (single selection).

A.

BGP drainage

B.

Second-layer drainage

C.

GRE drainage

Full Access
Question # 26

End devices and users must authenticate and authorize before they can access the post-authentication domain.

A.

TRUE

B.

FALSE

Full Access
Question # 27

Which of the following services are security management services in HUAWEI CLOUD solutions?

A.

DDOS Anti-DDoS Pro IP services

B.

Situational awareness services

C.

SSL certificate management service

D.

Security Expert Services

Full Access
Question # 28

With the following description of the load balancing feature of USG Firewall Server, what are the correct items?

A.

The IP address specified in the security policy should be the IP address of the real server

B.

The IP address specified in the security policy should be the IP address of the virtual server

C.

Modifying the destination IP address and destination port number of a packet occurs after querying the inter-domain security policy

D.

Modifying the destination IP address and destination port number occurs before querying the inter-domain security policy

Full Access
Question # 29

Which of the following options are the main dangers of computer Trojans?

A.

User files are corrupted

B.

Illegal remote control of a computer

C.

Personal accounts, passwords and other information are stolen

D.

Cause the system to slow down or even freeze

Full Access
Question # 30

Employees visit illegal or malicious websites at will Viruses, Trojans, and worms will be attacked, so we need to enable URL filtering. Which of the following options is a feature of URL Shopping?

A.

Great impact on performance However, only HTTP/HTTPS access is controlled

B.

The impact on performance is small And all services corresponding to the domain name can be controlled

C.

Control in the domain name resolution stage, control the granularity Control can only be done down to the domain name level

D.

Control is performed during the URL request phase of making HTTP/HTTPs Fine control granularity Can be controlled down to the directory and file level

Full Access
Question # 31

By default, two subnets of the same VPC network deployed in different physical resource pools cannot access each other.

A.

TRUE

B.

FALSE

Full Access
Question # 32

DNS Request Flood for DNS authoritative servers If TC source authentication is used The client device does not support using TCP to send DNS requests, how to verify the identity of the client? (single selection).

A.

Use planting load inspection

B.

Use DNS dynamic mode

C.

Use 302 redirect

D.

Use CHAME

Full Access
Question # 33

The sandbox and the firewall link anti-virus After the sandbox detects the virus file, the next information is fed back to the firewall (radio selection).

A.

Application

B.

Source IP

C.

URL

D.

File MD5

Full Access
Question # 34

Data destruction refers to the use of various technical means to completely delete the data in computer storage devices, so as to prevent unauthorized users from using residual data to restore the original data information, so as to achieve the purpose of protecting key data. Which of the following options is wrong about how data is destroyed?

A.

Storage media such as disk or tape It's all magnetic technology If it can destroy its magnetic structure The existing data no longer exists.

B.

In addition to low-level formatting of disks and tapes, it can also be done in the form of physical rhetoric

C.

Since tapes can be used repeatedly, data can be destroyed using overwrite. As long as the disk is overwritten once Data cannot be interpreted.

D.

Destruction of the entity's storage media Make the data unreadable by the system It is also one of the ways to ensure the confidentiality and security of data.

Full Access
Question # 35

Which of the following options are part of the Internet Behavior? (multiple selection).

A.

Keywords that users search for using search engines

B.

Sending and receiving emails

C.

User QQ account and its online and offline time

D.

User profiles

Full Access
Question # 36

Formatting your computer means that the files have been completely erased Unable to fix.

A.

TRUE

B.

FALSE

Full Access
Question # 37

The following is a description of DNS transparent proxy Which ones are correct? (multiple selection).

A.

The DNS proxy function replaces the source address header in the DNS request packet.

B.

After enabling the DNS transparent proxy function The DNS server address to replace is determined for the outgoing interface

C.

In the case of NGFW as the exit network and the DNS server of the enterprise intranet The DNS transparent proxy function can still be implemented normally.

D.

Two DNS requests for the same user in the case of DNS transparent proxies The replaced address may be different.

Full Access
Question # 38

The firewall policy feature supports IPv4, but does not support IPv6 (radio selection).

A.

TRUE

B.

FALSE

Full Access
Question # 39

The purpose of access control is to provide access to authorized subjects and prevent any unauthorized and intentional access.

A.

TRUE

B.

FALSE

Full Access