Huawei H12-731_V2.0-ENU HCIE-Security (Written) V2.0 Online Training
Huawei H12-731_V2.0-ENU Online Training
The questions for H12-731_V2.0-ENU were last updated at Nov 19,2024.
- Exam Code: H12-731_V2.0-ENU
- Exam Name: HCIE-Security (Written) V2.0
- Certification Provider: Huawei
- Latest update: Nov 19,2024
Which of the following does HiSec Insight’s big data processing not include?
- A . Data preprocessing
- B . Flow data collection
- C . Distributed storage
- D . Distributed indexes
Multi-factor authentication is mainly used in scenarios of login protection and operation protection.
- A . TRUE
- B . FALSE
When there is a large amount of data (such as photos, videos or database files, etc.) that need to be added and unsealed, the user can encrypt and decrypt the data by encrypting the data with the number of watermarks, and the data can be encrypted and decrypted without transmitting a large amount of data over the network
- A . TRUE
- B . FALSE
Which of the following features can be used for operation auditing of HUAWEI CLOUD bastion hosts?
- A . report analysis
- B . Double License
- C . Work order management
- D . Action playback
When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ensure the security of user data operations.
- A . Transmission security
- B . Storage security
- C . Destroy security
- D . Collect security
After you deploy HUAWEI CLOUD WAF Traffic to the tenant’s Neb server is sent directly to the origin server Cloud WAF intercepts and detects traffic whose destination IP address is the IP address of the origin server.
- A . TRUE
- B . FALSE
Which of the following services are security management services in HUAWEI CLOUD solutions?
- A . DDOS Anti-DDoS Pro IP services
- B . Situational awareness services
- C . SSL certificate management service
- D . Security Expert Services
The purpose of access control is to provide access to authorized subjects and prevent any unauthorized and intentional access.
- A . TRUE
- B . FALSE
When USG Firewall sends logs outward, it supports several different log information encapsulation formats.
Which of the following items is a supported firewall format?
- A . Netflow format
- B . Datafl ow format
- C . Binary format
- D . Syslog format
USG firewall’s DDoS attack prevention techniques include which of the following?
- A . Current limiting technology
- B . Cryptography
- C . Fingerprint technology
- D . Source detection technology