Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

HCIE-Security H12-731_V2.0 Release Date

Page: 6 / 10
Total 276 questions

HCIE-Security (Written) V2.0 Questions and Answers

Question 21

Which of the following services are security management services in HUAWEI CLOUD solutions?

Options:

A.

DDOS Anti-DDoS Pro IP services

B.

Situational awareness services

C.

SSL certificate management service

D.

Security Expert Services

Question 22

In the following description of IPv6 security features, which one is wrong? (single selection).

As IPv6 DNS and other related protocols are designed for security

B. IPv6 addresses can be generated by encryption However, privacy headers are not supported

C. AH, and ES can be used as extension headers for IPv6 IPsec is used for additional security.

D. The IPv6 address is 128 bits to ensure that the source address is trusted

Options:

Question 23

With the following description of the load balancing feature of USG Firewall Server, what are the correct items?

Options:

A.

The IP address specified in the security policy should be the IP address of the real server

B.

The IP address specified in the security policy should be the IP address of the virtual server

C.

Modifying the destination IP address and destination port number of a packet occurs after querying the inter-domain security policy

D.

Modifying the destination IP address and destination port number occurs before querying the inter-domain security policy

Question 24

The following describes vulnerabilities and identification and assessment Which one is incorrect? (single selection).

Options:

A.

In the technical vulnerability point, identify the vulnerable point of the application system From the audit mechanism Audit storage and access control policies. Data integrity Identification Password protection and other aspects for identification.

B.

Vulnerability identification is also called vulnerability identification, and weakness is the existence of capital itself If there is no corresponding threat, the weakness itself will not cause damage to capital.

C.

Vulnerability points are divided into two types: technical vulnerabilities and management vulnerabilities. The management vulnerability identification image is only for the management part of the organization

D.

The severity of the technical vulnerability of an asset is affected by the organization's management vulnerability. Therefore, the vulnerability of assets should also be assigned with reference to the severity of technical management and organizational management vulnerabilities.

Page: 6 / 10
Total 276 questions