Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-731_V2.0 Questions and Answers

Note! Following H12-731_V2.0 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-731_V2.0 Questions and Answers

Question # 6

The following is a description of the trapping technique The correct ones are which women's multiple choices).

A.

If the attacker cannot notice the fake service provided by the honeypot, the capture efficiency of the honeypot is relatively low

B.

Honeypot technology is to absorb the network by deploying some king machines as bait Trick attackers into attacking them This allows attacks to be captured and analyzed

C.

Discuss the access layer switch equipment as honeypot equipment

D.

The honeypile can only passively wait for the attacker to attack

Full Access
Question # 7

The server can set or read the information contained in the cookie This maintains state in the user's session with the server.

A5RUE

B. FALSE

Full Access
Question # 8

The following is a description of FW's audit conduct. Which one is correct? (single selection).

A.

After you create or modify an audit profile, the configuration content takes effect immediately.

B.

By default, the audit function of outgoing file content is enabled by default.

C.

By default HTTP status code audit mode is the default mode Only common HTTP status codes are audited.

Full Access
Question # 9

What are the following descriptions of cybertrapping techniques that are wrong? (multiple selection).

A.

Trapping needles support simulation services

B.

The trapping technology scheme consists of two parts: trap and trapping probe

C.

The trapping probe is a honeypot

D.

The trapping probe is responsible for identifying the scanning behavior in the network and directing traffic to the trap

Full Access
Question # 10

Each element of the audit policy can be flexibly configured, which is convenient for users to classify, classify audit and response, so how many elements the audit strategy includes

A.

3

B.

1

C.

2

D.

4

Full Access
Question # 11

With the prevalence of e-commerce, online banking, e-government The business value of WEB servers is getting higher and higher, and the security threats faced by web servers are also increasing, and the defense against the web application layer has become an inevitable trend, WAF (WebApplication Firewall WEB APPLICATION FIREWALL) PRODUCTS BEGAN TO BECOME POPULAR. As shown in the figure The firewall uses the deployment mode of transparent proxy About the deployment mode of WAF using transparent proxy Which of the following options is described incorrectly.

A.

You need to configure the IP address and route for the forwarding interface of the WAF

B.

The agent works in route-forwarding mode instead of bridge mode

C.

JUDGING FROM THE ANGULARITY OF THE WEB CLIENT THE WEB CLIENT IS STILL DIRECTLY ACCESSING THE SERVER AND IS NOT AWARE OF THE EXISTENCE OF WAF

D.

Minimal network changes enable zero-configuration deployment

Full Access
Question # 12

Regarding ECA probe carrier entities, which of the following cannot be ECA probe carrier entities?

A.

S switch

B.

firewall

C.

CE switch

D.

HiSec Insight flow probe

Full Access
Question # 13

With the following description of the difference between stored XSS and reflected XSS, what are the correct items? (multiple selection).

A.

Attacks caused by stored XSS are persistent

B.

The attack code of stored XSS is stored on the target server

C.

The attack code of the reflected XSS is stored on the target server

D.

Attacks caused by reflective XSS are persistent

Full Access
Question # 14

Which of the following attacks can be detected by a point device. (Single selection)

A.

Delete the process

B.

Encrypt malicious traffic

C.

Password brute force cracking

D.

User privilege elevation

Full Access
Question # 15

Configure the source NAT policy for the campus network egress firewall to use the internal network users to access the external network, if you need to use security policies to block access to the external network The source IP address matched in the security policy is the private IP address of the user.

A.

TRUE

B.

FALSE

Full Access
Question # 16

The following is a description of FW's DNS filtering feature What are the correct options? (multiple selection).

A.

The DNS overcast function has a great impact on the performance of the device compared to the URL overcast, but all services corresponding to the domain name can be controlled.

B.

DNS filtering can be controlled at the stage of initiating HTTP/HHPS URL requests.

C.

DNS filtering can release or block requests for different time periods or different users/groups by referencing time periods or users/groups.

D.

The DNS filtering function is usually used in enterprise gateways to effectively manage users' access to network resources

Full Access
Question # 17

There are many firewall security policies in the data center network, and the administrator enables the policy backup acceleration function, and the source address matching conditions of the security policy are modified It can be effective immediately.

A.

TRUE

B.

FALSE

Full Access
Question # 18

By default, the firewall authenticates traffic that passes through itself.

A.

TRUE

B.

FALSE

Full Access
Question # 19

The following describes the configuration contents of the firewall file filtering feature Which one is wrong, (single selection).

A.

Use the command display current-configuration to display configuration information for the default configuration file itself.

B.

The administrator should first clarify which types of files need to be purged, and then select the types of files that the device can support Finally, fill in the remaining file types in "Custom extension".

C.

When the default configuration file is referenced by the command line configuration security policy You need to enter the full profile name Otherwise, it cannot be successfully referenced.

D.

Under the command line interface, you can view the configuration information in the default configuration file through the command display profile type url-filter.

Full Access
Question # 20

Digital certificates can ensure the credibility of the public key of the communicating partner in the process of data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 21

The following description of information security training Which items are correct? (multiple selection).

A.

Even for safety training, the focus will be different for different departments.

B.

In terms of training content For senior executives, training on information security strategies and information security laws and regulations is required.

C.

For grassroots employees, some safety technology training should be emphasized.

D.

In terms of training method For most employees, just one induction training is not enough attention, and frequent email campaigns are needed to raise awareness of information security

Full Access
Question # 22

In the following description of the principles of network trapping defense, which are correct? (multiple selection).

A.

Installing threats against network weapons, network trapping defense technology, can use deception to make the attack execute special commands in the trapping system

B.

In the face of viruses, worms, WebShell these weaponized attack methods, can use misleading methods to make the attack traffic be diverted to trap probe O

C.

For the detection behavior in the early stage of the attack, you can use deception to burst into defense. By creating various traps to mislead the attacker. Cause attackers to misunderstand the network structure, attack targets, and vulnerabilities.

D.

Network trapping technology can disguise the actual business and vulnerabilities to mislead the attacker, so that the attacker can infiltrate the trapping system.

Full Access
Question # 23

The following suggestions for deploying heartbeats between firewalls with hot standby on both devices, which are correct?

A.

It is recommended that the heartbeat port be connected directly with a network cable or optical fiber

B.

We recommend that you plan a special interface as a heartbeat port and do not direct service packets to the heartbeat connection and forward

C.

It is recommended to configure at least 2 heartbeat ports, one as the main use One as a backup

D.

It is proposed to use a cross-board Eth-trunk port as a heartbeat port between the two firewalls.

Full Access
Question # 24

PT (Advanced Persistent Threat) attacks are stealthy and persistent computer intrusion processes, usually orchestrated by certain personnel For specific goals.

A5RUE

B. FALSE

Full Access
Question # 25

What is correct in the following description of the capabilities of cybertrapping techniques? (multiple selection).

A.

Network trapping technology can automatically sense APR-MISS and realize trapping.

B.

Network trapping technology can automatically sense the non-existence of IP and realize trapping.

C.

Network trapping technology can automatically sense the absence of MAC addresses and realize trapping.

D.

Network trapping technology can automatically sense open ports and realize trapping.

Full Access
Question # 26

In the WAF defense-in-depth system, which of the following security checks is used to protect against CC attacks? (single selection).

A.

Content security check

B.

Access behavior security check

C.

Security checks for sensitive information

D.

Network security inspection

Full Access
Question # 27

Which of the following options is part of the business security resiliency (multiple choices)?

A.

Establish a secure business environment

B.

Improve situational awareness and resiliency of your business

C.

Build defense-in-depth capabilities for your business

D.

Do a good job of protecting the equipment at the point

Full Access
Question # 28

Which of the following can be used as a Huawei IPS device to determine intrusion behavior? (single selection).

A.

Session table

B.

signature

C.

Routing table

D.

IP address

Full Access
Question # 29

The following describes the authorization of the log license Which is correct? (single selection).

A.

The generation of anti-virus logs has nothing to do with license authorization

B.

The generation of intrusion prevention logs has nothing to do with license authorization

C.

The generation of audit logs has nothing to do with license authorization

D.

Sandbox detection logs include local sandbox and cloud sandbox detection logs, and cloud sandbox detection requires license authorization

Full Access
Question # 30

DNS Request Flood for DNS authoritative servers If TC source authentication is used The client device does not support using TCP to send DNS requests, how to verify the identity of the client? (single selection).

A.

Use planting load inspection

B.

Use DNS dynamic mode

C.

Use 302 redirect

D.

Use CHAME

Full Access
Question # 31

Take the following description of safety measures Which one is wrong? (single selection).

A.

Security audit can identify risks by analyzing threat logs

B.

Security audit is usually divided into database audit, behavior audit and operation and maintenance audit

C.

Security audit is generally a post-event audit, because permission management and authorization are the core of security audit

D.

B/S architecture model and C/S class of database audit Implement a two-layer (presentation layer, data access layer) architecture

Full Access
Question # 32

In the Anti-DDos system, the function of cleaning devices is to detect anomalous traffic in the network and escalate to the management centre (single selection).

A.

TRUE

B.

FALSE

Full Access
Question # 33

One of the reasons why traditional passive defense does not protect against APT attacks is that traditional defense methods cannot correlate and analyze threats.

A.

TRUE

B.

FALSE

Full Access
Question # 34

The sandbox is actively protected against viruses (single selection)

A.

TRUE

B.

FALSE

Full Access
Question # 35

After you deploy HUAWEI CLOUD ANTI-DDoS Pro or Anti-DDoS Premium (DDoS Pro) or Anti-DDoS Pro, whether or not a DDoS attack occurs All access traffic is sent directly to the origin server IPo

A.

TRUE

B.

FALSE

Full Access
Question # 36

Which of the following is not a way to back up data? (Single selection)

A.

Server-Less 份

B.

Client-Less backup

C.

LAN-Free S份

D.

LAN backup

Full Access
Question # 37

XSS vulnerabilities are injection vulnerabilities formed by sending invalid database commands

A.

TRUE

B.

FALSE

Full Access
Question # 38

Take the following about

1、Icx.exe-slave 192.168.122.111:4444 192.168.122.128:3389

2、lex -listen 3456 3789

What is the correct understanding? (Multiple selection)

A.

In the second point, the server's port 3456 request is transmitted to port 3389

B.

In the second point, the server's port 3789 request is transmitted to port 3456

C.

In the first point, forward the data on port 4444 of the server to 192.168.122.128:3389 ±

D.

In the first point, forward the server's port 3389 data to 192.168.122.111: 4444

Full Access
Question # 39

How long does the three-level guarantee re-evaluate

A.

Half

B.

- years

C.

2 years

Full Access
Question # 40

The following describes the network scanning defense technology Which one is wrong? (single selection).

A.

The trapping probe has a business simulation function.

B.

Firewalls and switch devices can act as trapping probes.

C.

In networking mode where the trap and the trap probe are on the same firewall| CIS and SecoManager are not required for trapping Closed-loop threat linkage can be completed directly through FW.

D.

The trapping system produces a unique fingerprint for each attacker Able to record hacker IP, operating system Information such as browser type, type of attack weapon, etC.

Full Access
Question # 41

Which of the following options fall under the Security Manager requirements in Graded Protection 2.0? A Grading and filing

B. System administration

C. Audit management

D. Centralized control

Full Access