Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-731_V2.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-731_V2.0 Exam Dumps - HCIE-Security (Written) V2.0

Question # 4

Let's see which devices can be used as Huawei CIS (Cybersecurity Intelligence system.). Trapping probes in network security intelligence systems?

A.

firewall

B.

switchboard

C.

router

D.

server

Full Access
Question # 5

A VPCA and VPCB are created under a virtual data center VDC, and host A (192.168.1.100/24) is applied for in the VPCA Filed Host B (1921682100/24). Now configure VPC access Create a virtual firewall security policy as follows:

Security-policy

Source-zone any

destination-zone any

source-address 192.168.2.100 32

destination-address 192.168.1.100 32

action permit

Which of the following statements is correct?

A.

A and B cannot visit each other

B.

Only A is allowed to access B

C.

A and B are able to visit each other

D.

Only B is allowed to visit A

Full Access
Question # 6

Which of the following attack methods of 24L can be used in the strike phase of the cyber attack chain? (multiple selection).

A.

DoS attacks

B.

Virus attack

C.

IP packet attack with routing record entries

D.

Drag the library

Full Access
Question # 7

JDBC is a mechanism for Java applications to talk to various different databases, and ODEC, similar to JDEC, is also an important database access technology.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following options allows complete destruction of data, (multiple selection)

A.

Degaussing method

B.

Multiple divisions

C.

Overwriting

D.

Mashing method

Full Access
Question # 9

Take the following about

1、Icx.exe-slave 192.168.122.111:4444 192.168.122.128:3389

2、lex -listen 3456 3789

What is the correct understanding? (Multiple selection)

A.

In the second point, the server's port 3456 request is transmitted to port 3389

B.

In the second point, the server's port 3789 request is transmitted to port 3456

C.

In the first point, forward the data on port 4444 of the server to 192.168.122.128:3389 ±

D.

In the first point, forward the server's port 3389 data to 192.168.122.111: 4444

Full Access
Question # 10

IPS (Intrusion Prevention System) is an application-layer-based security appliance, so which of the following options is it used to match attack identification?

A.

Destination IP address

B.

Port number

C.

Feature library

D.

Source IP address

Full Access
Question # 11

In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).

A.

TRUE

B.

FALSE

Full Access
Question # 12

Which of the following implementation elements is a multi-choice that can be controlled throughout cloud operations).

A.

Security policy deployment

B.

Account authority management

C.

Risks can be identified

D.

The operation can be audited

Full Access
Question # 13

The FireHunter series of sandboxes gives accurate results based on the analysis Real-time detection, blocking and reporting of grayscale â– Flow volume Effectively avoid the rapid spread of unknown threat attacks and the loss of enterprise core information assets.

A.

TRUE

B.

FALSE

Full Access
Question # 14

The following is a description of traceability audits Which one is correct? (single selection).

A.

In a networking environment where the packet return path is inconsistent, the content of the audit log record is not complete.

B.

Only audit administrators can configure audit functions and view audit logs

C.

In the security policy, traffic configured as deny will be processed by the audit policy.

D.

The audit strategy includes two parts: conditions and actions By matching any of the conditions, a response action can be performed.

Full Access
Question # 15

According to the type and purpose of the bait, it can be divided into log bait, certificate bait, account bait, email bait, project code bait, etC.

A.

TRUE

B.

FALSE

Full Access
Question # 16

The target IP address information can be collected through attacks, such as distributed denial-of-service attacks to obtain the target's IP information. (single selection).

A.

TRUE

B.

B. FALSE

Full Access
Question # 17

Requirements for physical facilities in the computer room in Class Protection 2.0

A.

Intrusion prevention

B.

Electromagnetic protection

C.

Personnel authorization

Full Access
Question # 18

PROTECTION AGAINST SLOW ATTACKS IN DDOS Anti-DDoS solutions with intelligent and anthropomorphic functions are better at defending against such attacks (single selection).

A.

TRUE

B.

FALSE

Full Access
Question # 19

If it is in the intrusion prevention configuration file Signatures, signature filters, and exception signatures are used at the same time When there is a configuration to the configuration file The following is about the order of matching Which option is correct? (single selection).

A.

Exception Signature〉Signature〉Signature filter

B.

Exception Signature〉Signature Over Filter〉Signature

C.

Signature〉Signature Filter 〉Exception Signature

D.

Signature filter 〉Signature〉Exception signature

Full Access
Question # 20

Which of the following can be used as a Huawei IPS device to determine intrusion behavior? (single selection).

A.

Session table

B.

signature

C.

Routing table

D.

IP address

Full Access
Question # 21

Regarding ECA probe carrier entities, which of the following cannot be ECA probe carrier entities?

A.

S switch

B.

firewall

C.

CE switch

D.

HiSec Insight flow probe

Full Access
Question # 22

The following describes how to create a trap account Which one is correct? (single selection).

Create a local account named Administrator and set its permissions to the most, plus a strong password of more than 10 digits

Create a local account named Administrator and set its permissions to the minimum, plus a weak password less than 6 digits

Create a local account named Administrator and set its permissions to the minimum, plus a strong password of more than 10 digits

D. Create a local account named Administrator and set its permissions to maximum Plus a weak password less than 6 digits

Full Access
Question # 23

Which of the following options is part of the business security resiliency (multiple choices)?

A.

Establish a secure business environment

B.

Improve situational awareness and resiliency of your business

C.

Build defense-in-depth capabilities for your business

D.

Do a good job of protecting the equipment at the point

Full Access
Question # 24

Digital certificates can ensure the credibility of the public key of the communicating partner in the process of data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Huawei's network security intelligence system CIS can only be linked with which of the following devices to block viruses?

A.

Firewall

B.

Agile Controller-Campus

C.

SecoManager

D.

AgileController-DCN

Full Access
Question # 26

In the WAF defense-in-depth system, which of the following security checks is used to protect against CC attacks? (single selection).

A.

Content security check

B.

Access behavior security check

C.

Security checks for sensitive information

D.

Network security inspection

Full Access
Question # 27

Which of the following are the certification factors in the biometric category?

A.

Eye iris

B.

PIN

C.

fingerprint

D.

Voice ripples

Full Access
Question # 28

In the cloud data center network Where are Anti-DDos appliances deployed? (single selection).

A.

Security operation and maintenance area

B.

Secure storage area

C.

Border network area

D.

Secure computing area

Full Access
Question # 29

By default, the firewall authenticates traffic that passes through itself.

A.

TRUE

B.

FALSE

Full Access
Question # 30

When personal privacy information is violated or leaked How to deal with the adoption of self-help measures?

A.

Require the infringer to stop the infringement.

B.

Obtain privacy information of infringers and warn them.

C.

Call the police and ask the public security authorities to deal with it.

D.

Filing a lawsuit in the people's court.

Full Access
Question # 31

Nmap can only be used to scan a single host, but it cannot be used to scan a large computer network to find out which hosts and services of interest are found

A.

TRUE

B.

FALSE

Full Access
Question # 32

With the following description of the database auditing system, which option is wrong? (single selection).

A.

Detect abnormal operations of legitimate users.

B.

Usually carry out direct deployment, extract messages and records.

Ability to analyze operational behavior that does not contain threat signatures.

C.

Support deployment in cloud environment, and the strategy is matched as needed Rules are on demand.

Full Access
Question # 33

Which of the following are the following ways to protect enterprise users from viruses? (Multiple selection)

A.

Close unnecessary ports of the host

B.

Install anti-virus software

C.

Patching

D.

Enhance safety awareness

Full Access
Question # 34

In the HCIE-Security V2.0 course architecture, which of the following pieces are included? (multiple selection).

A.

Cloud security

B.

Security operations and analytics

C.

Security attack and defense technology

D.

Code auditing

Full Access
Question # 35

Data storage security is part of the customer's overall security program It is also an important part of data center security and organizational security. Which of the following options is important to keep your data storage secure?

A.

Encrypted storage of data

B.

Ensure data integrity

C.

Data Backup and Recovery

D.

Protection against data destruction

Full Access
Question # 36

Which data security is the purpose of data watermark traceability?

A.

Collection security

B.

Transport security

C.

Storage security

D.

Exchange security

Full Access
Question # 37

After you deploy HUAWEI CLOUD ANTI-DDoS Pro or Anti-DDoS Premium (DDoS Pro) or Anti-DDoS Pro, whether or not a DDoS attack occurs All access traffic is sent directly to the origin server IPo

A.

TRUE

B.

FALSE

Full Access
Question # 38

In the Cloudabric scenario, which of the following ways is the firewall deployed?

A.

One machine deployment

B.

Primary/standby dual-machine images

C.

Dual machine load sharing

D.

Hot standby for both active and standby machines

Full Access
Question # 39

the electric power and military industry-related industries need to use several levels of equal protection

A.

Guidance xx

B.

Supervise xx

C.

Mandatory xx

D.

Exclusive control xx

Full Access
Question # 40

DNS Request Flood for DNS authoritative servers If TC source authentication is used The client device does not support using TCP to send DNS requests, how to verify the identity of the client? (single selection).

A.

Use planting load inspection

B.

Use DNS dynamic mode

C.

Use 302 redirect

D.

Use CHAME

Full Access
Question # 41

Log formats are diverse At present, there is no unified log format standard in the world, and different manufacturers have formulated corresponding log formats (single selection) according to their own needs

A.

TRUE

B.

FALSE

Full Access