Labour Day - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Note! The H12-731_V2.0 Exam is no longer available.

H12-731_V2.0 HCIE-Security (Written) V2.0 Questions and Answers

Questions 4

Which of the following options are part of the Internet Behavior? (multiple selection).

Options:

A.

Keywords that users search for using search engines

B.

Sending and receiving emails

C.

User QQ account and its online and offline time

D.

User profiles

Buy Now
Questions 5

Which of the following options protects against SMRF attacks?

Options:

A.

If the source address of an ICMP request packet is a broadcast address, the packet is discarded

B.

If the destination address of an ICMP request packet is a network address, the packet is discarded

C.

If the destination address of an ICMP request packet is a broadcast address, the packet is discarded

D.

If the source address of the ICMP request packet is the host address The message is discarded

Buy Now
Questions 6

Which of the following scenarios is for network intrusion prevention? (multiple selection).

Options:

A.

IDC or server cluster frontend.

B.

The front end of the firewall for the exit of the corporate network.

C.

Between branches of the company's network interconnection.

D.

The boundary between the campus network and the Internet❷

Buy Now
Questions 7

Huawei's Sec Insight system comes with the function of stream pin.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

Common database security audit techniques according to technical characteristics What are the categories that can be divided into? (multiple selection).

Options:

A.

Agent-based audit technology

B.

Log-based estimation technology

C.

Gateway-based audit technology

D.

Audit technology based on network monitoring

Buy Now
Questions 9

Huawei proposes • Partition Defense Unified Detection - Security Scheme Which of the following partitions requires a summer firewall").

Options:

A.

Internet boundaries

B.

Business service area

C.

Office network

D.

Core exchange area

Buy Now
Questions 10

Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network The source IP address matched in the security policy is the private IP address of the user.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

When it is not in the same deployment as the log server, only FW can send conference logs to the log server through the IPSec tunnel and GRE tunnel (single selection).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

The HUAWEI CLOUD Dedicated HSM service can be used to handle operations such as encryption and decryption, signing, signature verification, key generation, and key security storage. After the user purchases the service, the provider has full control over the generation, storage and access authorization of the key.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 13

Regarding ECA probe carrier entities, which of the following cannot be ECA probe carrier entities?

Options:

A.

S switch

B.

firewall

C.

CE switch

D.

HiSec Insight flow probe

Buy Now
Questions 14

In the cyber attack chain... Each stage may use multiple attack methods, or one attack method can be used in multiple stages. (single selection).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Which of the following options does not need to be designed when implementing data storage security in the cloud? (Single selection)

Options:

A.

Document encryption

B.

Key management

C.

Database encryption

D.

Data upload encryption

Buy Now
Questions 16

In the first half of 2021 alone, there were 944 data breaches that resulted in 3.3 billion data records being compromised. Organizations must follow the principle of which of the following options to keep data safe at all times.

Options:

A.

in the file system Data at rest is protected on the database through storage technology

B.

Check database backups regularly

C.

Protection of data in use when using or processing data

D.

Protect data in transit as it travels across the network

Buy Now
Questions 17

What should I do when my personal privacy information is violated or leaked (multiple choices)?

Options:

A.

Obtain privacy information of infringers and warn them.

B.

Self-help measures Require the infringer to stop the infringement

C.

Filing a lawsuit in the people's court

D.

Call the police and ask the public security organs to deal with it.

Buy Now
Questions 18

Which of the following options is not included in the data theft phase of HiSec Insight?

A Ping Tunnel detection

B. DNS Turnel detection

C. Traffic base anomaly detection

D. Web anomaly detection

Options:

Buy Now
Questions 19

In which of the following cyberattacks might a virus attack be applied? (Multiple selection)

Options:

A.

Sabotage

B.

Infiltration

C.

Elevation of power

D.

Information Collection

Buy Now
Questions 20

End devices and users must authenticate and authorize before they can access the post-authentication domain.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Which of the following options are the main dangers of computer Trojans?

Options:

A.

Personal accounts, passwords and other information were stolen

B.

Cause the system to slow down or even freeze

C.

Illegal remote control of a computer

D.

User files are corrupted

Buy Now
Questions 22

The following describes the network scanning defense technology Which one is wrong? (single selection).

Options:

A.

The trapping probe has a business simulation function.

B.

Firewalls and switch devices can act as trapping probes.

C.

In networking mode where the trap and the trap probe are on the same firewall| CIS and SecoManager are not required for trapping Closed-loop threat linkage can be completed directly through FW.

D.

The trapping system produces a unique fingerprint for each attacker Able to record hacker IP, operating system Information such as browser type, type of attack weapon, etC.

Buy Now
Questions 23

XSS vulnerabilities are injection vulnerabilities formed by sending invalid database commands

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

Implement secure communication network requirements for Class-Protect on HUAWEI CLOUD Which of the following services does not need to be covered? (single selection).

Options:

A.

Install anti-virus software

B.

Web application protection

C.

Anti-DDoS Pro

D.

Security groups

Buy Now
Questions 25

Each element of the audit policy can be flexibly configured, which is convenient for users to classify, classify audit and response, so how many elements the audit strategy includes

Options:

A.

3

B.

1

C.

2

D.

4

Buy Now
Questions 26

At this time, there is no defense against C&C attacks that use TLS for encryption

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

In the Anti-DDos system, the function of cleaning devices is to detect anomalous traffic in the network and escalate to the management centre (single selection).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

When you use ATIC for defense policy configuration, the defense system that can be configured does not include which of the following options> (single selection).

Options:

A.

Blocking

B.

Current limiting

C.

Defense

D.

Detection

Buy Now
Questions 29

The sandbox and the firewall link anti-virus After the sandbox detects the virus file, the next information is fed back to the firewall (radio selection).

Options:

A.

Application

B.

Source IP

C.

URL

D.

File MD5

Buy Now
Questions 30

The following suggestions for deploying heartbeats between firewalls with hot standby on both devices, which are correct?

Options:

A.

It is recommended that the heartbeat port be connected directly with a network cable or optical fiber

B.

We recommend that you plan a special interface as a heartbeat port and do not direct service packets to the heartbeat connection and forward

C.

It is recommended to configure at least 2 heartbeat ports, one as the main use One as a backup

D.

It is proposed to use a cross-board Eth-trunk port as a heartbeat port between the two firewalls.

Buy Now
Questions 31

The global nature of the Internet exposes Teb services to attacks of varying sizes, sizes, and sophistications So which of the following options can secure Web services?

Options:

A.

run IIS Lockdown Wizzard

B.

Install the latest operating system patches

C.

Disable default and management of web sites

D.

Disable network printing

Buy Now
Questions 32

Which of the following options is primarily detected by Threat Detection Services (MTD)?

Options:

A.

CTS full logs

B.

Unified Authentication Service (IAM) full logs

C.

Full volumes of Cloud Resolution Service (DNS) logs

D.

Security Guard Device Logs

Buy Now
Questions 33

Which of the following standard bills is relevant to security audits? (Multiple selection)

Options:

A.

sox

B.

IS027001

C.

IS022000

D.

Graded protection

Buy Now
Questions 34

The signature filter will batch out signatures, and usually set to a uniform action for ease of management. If an app wants to treat it differently You can also use exception signatures to match O's from signature filters

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

The guarantee of information security does not need to be fully integrated with business implementation, because information security will increase the complexity of the network and reduce the efficiency of business processing. (single selection).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

Which options below are the main changes in Equal Protection 2.0 compared to Equal Protection 1.0' (multiple choices).

Options:

A.

The classification of general safety requirements is more detailed.

B.

The workflow of equal protection assessment is more detailed.

C.

Added expansion requirements.

D.

The security requirements of each level are more detailed.

Buy Now
Questions 37

Which of the following devices can be used to sense the intranet situation in conjunction with situational awareness technology? (Multiple selection)

Options:

A.

Agile-controller DCN

B.

FireHunter

C.

VSCAN

D.

SecoManager

Buy Now
Questions 38

Zombie networks are used to spread viruses and cannot launch DDos attacks

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 39

Clear the corresponding information safety standards on the left side with the country/organization on the right by dragging and dropping.

GB EU

TCSEC China

TCSEC USA

Options:

Buy Now
Questions 40

By default, two subnets of the same VPC network deployed in different physical resource pools cannot access each other.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Which of the following options fall under the Security Manager requirements in Graded Protection 2.0? A Grading and filing

B. System administration

C. Audit management

D. Centralized control

Options:

Buy Now
Exam Code: H12-731_V2.0
Exam Name: HCIE-Security (Written) V2.0
Last Update: Mar 15, 2024
Questions: 276
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 25 Apr 2024