New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following H12-731_V2.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-731_V2.0 Exam Dumps - HCIE-Security (Written) V2.0

Go to page:
Question # 4

Let's see which devices can be used as Huawei CIS (Cybersecurity Intelligence system.). Trapping probes in network security intelligence systems?

A.

firewall

B.

switchboard

C.

router

D.

server

Full Access
Question # 5

A VPCA and VPCB are created under a virtual data center VDC, and host A (192.168.1.100/24) is applied for in the VPCA Filed Host B (1921682100/24). Now configure VPC access Create a virtual firewall security policy as follows:

Security-policy

Source-zone any

destination-zone any

source-address 192.168.2.100 32

destination-address 192.168.1.100 32

action permit

Which of the following statements is correct?

A.

A and B cannot visit each other

B.

Only A is allowed to access B

C.

A and B are able to visit each other

D.

Only B is allowed to visit A

Full Access
Question # 6

Which of the following attack methods of 24L can be used in the strike phase of the cyber attack chain? (multiple selection).

A.

DoS attacks

B.

Virus attack

C.

IP packet attack with routing record entries

D.

Drag the library

Full Access
Question # 7

JDBC is a mechanism for Java applications to talk to various different databases, and ODEC, similar to JDEC, is also an important database access technology.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following options allows complete destruction of data, (multiple selection)

A.

Degaussing method

B.

Multiple divisions

C.

Overwriting

D.

Mashing method

Full Access
Go to page: