Pre-Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pearson H12-731_V2.0 New Attempt

Page: 5 / 10
Total 276 questions

HCIE-Security (Written) V2.0 Questions and Answers

Question 17

Right to request rectification by the data controller Which right of the data subject does the data subject belong to the completion of inaccurate/incomplete personal data? (single selection).

Options:

A.

Right of Access

B.

Right to Measure and Remove

C.

Right to Correction

D.

Right to know

Question 18

The following description of information security training Which items are correct? (multiple selection).

Options:

A.

Even for safety training, the focus will be different for different departments.

B.

In terms of training content For senior executives, training on information security strategies and information security laws and regulations is required.

C.

For grassroots employees, some safety technology training should be emphasized.

D.

In terms of training method For most employees, just one induction training is not enough attention, and frequent email campaigns are needed to raise awareness of information security

Question 19

The following describes the service identification Which item ◊ (single selection) is wrong

Options:

A.

Service identification is a reconnaissance technique that identifies the type of service provided by the server.

B.

The SSH protocol will actively inform visitors of their version information.

C.

An attacker can retrieve the relevant hole according to the service version and exploit it.

D.

The identification of all services can be achieved through port scanning technology.

Question 20

Which of the following options are the main dangers of computer Trojans?

Options:

A.

User files are corrupted

B.

Illegal remote control of a computer

C.

Personal accounts, passwords and other information are stolen

D.

Cause the system to slow down or even freeze

Page: 5 / 10
Total 276 questions