Huawei H12-731_V2.0-ENU HCIE-Security (Written) V2.0 Online Training
Huawei H12-731_V2.0-ENU Online Training
The questions for H12-731_V2.0-ENU were last updated at Nov 19,2024.
- Exam Code: H12-731_V2.0-ENU
- Exam Name: HCIE-Security (Written) V2.0
- Certification Provider: Huawei
- Latest update: Nov 19,2024
Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network. The source IP address matched in the security policy is the private IP address of the user.
- A . TRUE
- B . FALSE
An important purpose of adopting a distributed denial-of-service attack architecture is to isolate network contacts Protect attackers… So that it will not be tracked by the monitoring system while the attack is in progress
- A . TRUE
- B . FALSE
Let’s see which devices can be used as Huawei CIS (Cybersecurity Intelligence system.).
Trapping probes in network security intelligence systems?
- A . firewall
- B . switchboard
- C . router
- D . server
With the prevalence of e-commerce, online banking, e-government. The business value of WEB servers is getting higher and higher, and the security threats faced by web servers are also increasing, and the defense against the web application layer has become an inevitable trend, WAF (Web Application Firewall WEB APPLICATION FIREWALL) PRODUCTS BEGAN TO BECOME POPULAR. As shown in the figure. The firewall uses the deployment mode of transparent proxy About the deployment mode of WAF using transparent proxy.
Which of the following options is described incorrectly.
- A . You need to configure the IP address and route for the forwarding interface of the WAF
- B . The agent works in route-forwarding mode instead of bridge mode
- C . JUDGING FROM THE ANGULARITY OF THE WEB CLIENT THE WEB CLIENT IS STILL DIRECTLY ACCESSING THE SERVER AND IS NOT AWARE OF THE EXISTENCE OF WAF
- D . Minimal network changes enable zero-configuration deployment
The web reputation feature categorizes websites and differentiates them according to different classifications. When a user visits a potentially risky website, it can be promptly alerted or blocked by the system thus helping the user quickly confirm the security of the target website.
Which of the following options does not fall under the classification of Web Reputation Sites?
- A . Default trusted Web site
- B . Customize trusted websites
- C . Customize the suspicious station
- D . Predefined trusted websites
With the continuous development of network technology. The firewall is also completing its own upgrade. The technology evolution that firewalls have undergone includes which of the following options
- A . Stateful Detection Firewall
- B . App Proxy Firewall
- C . Packet filtering firewall
- D . Web firewall
NIP provides security mechanisms from multiple levels such as administrators and logs to build the security of operation and maintenance.
Which of the following security options are included?
- A . Administrator decentralization and domain management mechanism
- B . Anti-brute force mechanism
- C . Protection mechanism for sensitive user information
- D . Access channel control
PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion processes, usually orchestrated by certain personnel For specific goals.
- A . TRUE
- B . FALSE
Employees visit illegal or malicious websites at will Viruses, Trojans, and worms will be attacked, so we need to enable URL filtering.
Which of the following options is a feature of URL Shopping?
- A . Great impact on performance However, only HTTP/HTTPS access is controlled
- B . The impact on performance is small And all services corresponding to the domain name can be controlled
- C . Control in the domain name resolution stage, control the granularity Control can only be done down to the domain name level
- D . Control is performed during the URL request phase of making HTTP/HTTPs Fine control granularity Can be controlled down to the directory and file level
Trojans due to infection of other files It also destroys computer systems, and at the same time replicates itself, so Trojans have the characteristics of traditional computer viruses.
- A . TRUE
- B . FALSE