Certsout Huawei-H12-731_V2.0

Page 1

HCIE-Security (Written) V2.0 Version: Demo [ Total Questions: 10] Web: www.certsout.com Email: support@certsout.com Huawei H12-731_V2.0

IMPORTANT NOTICE

Feedback

We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions, please feel free to contact us at feedback@certsout.com

Support

If you have any questions about our product, please provide the following items:

exam code

screenshot of the question

login id/email

please contact us at and our technical experts will provide support within 24 hours.

Copyright

support@certsout.com

The product of each order has its own encryption code, so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement.

Question #:1

In the enterprise network, the source IP address and the destination IP address need to be translated at the same time, and there is no fixed mapping relationship before and after the destination IP address translation The following USC firewall features which combined can buy cash out less demand

Static mapping

Static destination NAT

Dynamic destination NAT

Source NAT

Answer: B D

Question #:2

The main role of the audit system is to audit security events after the fact To provide sufficient evidence, a security audit product must have which of the following features7

Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation

It can provide fine-grained access control to maximize the security of user resources

It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account

It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise

Answer: D

Question #:3

The antivirus system identifies the target of attack based on the characteristics of the detected object The APT defense system identifies the attack object based on the behavior of the detected object.

Answer: A

Question #:4

Huawei - H12-731_V2.0 Certs Exam 1 of 4 Pass with Valid Exam Questions Pool
B.
D. A. B. C. D.
B.
A.
C.
A.
TRUE FALSE

The following describes the security risks caused by ordinary users Which gas single choice is wrong)

Unauthorized access to business systems unrelated to their own work

The user copies the screen content, My Screen or copied by other unlawful means Download the data library.

Fake user identity query and obtain data resulting in data leakage 5JL

Accidental operation causes the O&M database to be deleted, Destruction.

Answer: D

Question #:5

The following describes how to create a trap account Which one is correct? (single selection).

Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits

Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits

Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits

D. Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits

C

Question #:6

In 2017, hackers unveiled a slew of cyberattack tools, including Eternal Blue tools. Then • Eternal Blue exploits the vulnerability of which of the following options of the Windows system can obtain the maximum relaxation limit of the system.

UMCODE vulnerability

Printer vulnerability

Frontpage server extension vulnerability

SMB vulnerabilities

Answer: C

Question #:7

Huawei - H12-731_V2.0 Certs Exam 2 of 4 Pass with Valid Exam Questions Pool A. B. C. D. A. B. C. D.

Which of the following options fall under the umbrella of Internet perimeter security considerations? (multiple selection).

Anti-ARP attacks

Protects against DDos attacks

Anti-virus

Leak prevention

Answer: B C D

Question #:8

The following is a humble description of transparent and reverse proxies Which items are correct? (multiple selection).

The deployment method of reverse proxy requires directing traffic to the WAF device.

The deployment method of transparent proxy requires directing traffic to the WAF device.

The deployment method of transparent proxy is to connect devices in the network.

The deployment method of reverse proxy is to connect devices in the network.

Answer: A C

Question #:9

DAS (Direct Attach STorage) is a storage method that connects directly to the host server Each host server has its own storage device o features about DA5 Which of the following options is incorrectly described?

DAS has the advantages of high bandwidth and low latency

DAS does not support file sharing with heterogeneous operating systems

DAS is usually used in a single network environment with minimal data exchange and low performance requirements

DAS is a type of block storage

Answer: A

Question #:10

Which of the following services are security management services in HUAWEI CLOUD solutions?

Huawei - H12-731_V2.0 Certs Exam 3 of 4 Pass with Valid Exam Questions Pool A. B. C. D. A. B. C. D. A. B. C. D.

A. B. C. D.

DDOS Anti-DDoS Pro IP services

Situational awareness services

SSL certificate management service

Security Expert Services

Answer: A B C D

Huawei - H12-731_V2.0 Certs Exam 4 of 4 Pass with Valid Exam Questions Pool

About certsout.com

certsout.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam Questions, Study Guides, Practice Tests.

We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.

View list of all certification exams: All vendors

We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below.

Sales: sales@certsout.com

Feedback: feedback@certsout.com

Support: support@certsout.com

Any problems about IT certification or our products, You can write us back and we will get back to you within 24 hours.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.