New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-731_V2.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-731_V2.0 Exam Dumps - HCIE-Security (Written) V2.0

Go to page:
Question # 9

Take the following about

1、Icx.exe-slave 192.168.122.111:4444 192.168.122.128:3389

2、lex -listen 3456 3789

What is the correct understanding? (Multiple selection)

A.

In the second point, the server's port 3456 request is transmitted to port 3389

B.

In the second point, the server's port 3789 request is transmitted to port 3456

C.

In the first point, forward the data on port 4444 of the server to 192.168.122.128:3389 ±

D.

In the first point, forward the server's port 3389 data to 192.168.122.111: 4444

Full Access
Question # 10

IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?

A.

Destination IP address

B.

Port number

C.

Feature library

D.

Source IP address

Full Access
Question # 11

In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).

A.

TRUE

B.

FALSE

Full Access
Question # 12

Which of the following implementation elements is a multi-choice that can be controlled throughout cloud operations).

A.

Security policy deployment

B.

Account authority management

C.

Risks can be identified

D.

The operation can be audited

Full Access
Question # 13

The FireHunter series of sandboxes gives accurate results based on the analysis Real-time detection, blocking and reporting of grayscale â– Flow volume Effectively avoid the rapid spread of unknown threat attacks and the loss of enterprise core information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 14

The following is a description of traceability audits Which one is correct? (single selection).

A.

In a networking environment where the packet return path is inconsistent, the content of the audit log record is not complete.

B.

Only audit administrators can configure audit functions and view audit logs

C.

In the security policy, traffic configured as deny will be processed by the audit policy.

D.

The audit strategy includes two parts: conditions and actions By matching any of the conditions, a response action can be performed.

Full Access
Question # 15

According to the type and purpose of the bait, it can be divided into log bait, certificate bait, account bait, email bait, project code bait, etC.

A.

TRUE

B.

FALSE

Full Access
Question # 16

The target IP address information can be collected through attacks, such as distributed denial-of-service attacks to obtain the target's IP information. (single selection).

A.

TRUE

B.

B. FALSE

Full Access
Go to page: