Huawei h12-731-v2-0 practice test

HCIE-Security (Written) V2.0

Last exam update: Nov 18 ,2025
Page 1 out of 19. Viewing questions 1-15 out of 277

Question 1

When personal privacy information is violated or leaked How to deal with the adoption of self-help
measures?

  • A. Require the infringer to stop the infringement.
  • B. Obtain privacy information of infringers and warn them.
  • C. Call the police and ask the public security authorities to deal with it.
  • D. Filing a lawsuit in the people's court.
Mark Question:
Answer:

ACD


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

According to the requirements of Graded Protection 2.0, the scope of security audits should cover
not only every operating system user on the server, but also which of the following

  • A. Database user
  • B. Monitor users
  • C. Configure the user
  • D. Non-admin users
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Databases often store important information about the enterprise, and hackers try to gain profits by
destroying servers and databases Therefore. Securing databases is becoming increasingly important.
Which of the following are common database political methods?
ASQL injection
B. Privilege elevation
C. Eliminate unpatched database vulnerabilities
D. Steal backed-up (unencrypted) tapes
E. Brute force weak password or default username and password

Mark Question:
Answer:

ABCDE


User Votes:
Discussions
vote your answer:
0 / 1000

Question 4

JDBC is a mechanism for Java applications to talk to various different databases, and ODEC, similar to
JDEC, is also an important database access technology.

  • A. TRUE
  • B. FALSE
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 5

In the Cloudabric scenario, which of the following ways is the firewall deployed?

  • A. One machine deployment
  • B. Primary/standby dual-machine images
  • C. Dual machine load sharing
  • D. Hot standby for both active and standby machines
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following options is not included in the data theft phase of HiSec Insight?
A Ping Tunnel detection
B. DNS Turnel detection
C. Traffic base anomaly detection
D. Web anomaly detection

Mark Question:
Answer:

ABD


User Votes:
Discussions
vote your answer:
0 / 1000

Question 7

When Hisec Insight is linked with terminals, it is mainly linked with the EDR of third-party vendors
with cooperative relationships.

  • A. TRUE
  • B. FALSE
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 8

Regarding situational awareness, is the following description correct?

  • A. Perception of elements in the environment
  • B. Rationale for the current situation
  • C. A projection of a longer period of time in the future
  • D. Perception of elements in a temporal and spatial environment An understanding of their meaning, and a projection of their later state
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

The main role of the audit system is to audit security events after the fact To provide sufficient
evidence, a security audit product must have which of the following features7

  • A. Protect the security of user communications and the integrity of data, and prevent malicious users from intercepting and tampering with data It can fully protect users from malicious damage during operation
  • B. It can provide fine-grained access control to maximize the security of user resources
  • C. It provides centralized management of all server and network device accounts, which can complete the monitoring and management of the entire life cycle of the account
  • D. It can automatically display the user's operation process and monitor the user's every behavior Determine whether the user's behavior poses a danger to the internal network security of the enterprise
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

On the principle of defense against trapping Which of the following is described as incorrect=

  • A. By deceiving network detection activities, fake resources are displayed, so that attackers cannot discover real system information and vulnerabilities
  • B. Interact with the attack campaign to confirm the intent and discover the attacker before the breach occurs
  • C. Trapping systems discover and block attacker attacks
  • D. Interference Attack Gathering System Information diaphragmatic weakness determination" process, inducing the attacker to expose the intention
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following does HiSec Insight's big data processing not include?

  • A. Data preprocessing
  • B. Flow data collection
  • C. Distributed storage
  • D. Distributed indexes
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Multi-factor authentication is mainly used in scenarios of login protection and operation protection.

  • A. TRUE
  • B. FALSE
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 13

When there is a large amount of data (such as photos, videos or database files, etc.) that need to be
added and unsealed, the user can encrypt and decrypt the data by encrypting the data with the
number of watermarks, and the data can be encrypted and decrypted without transmitting a large
amount of data over the network

  • A. TRUE
  • B. FALSE
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
Discussions
vote your answer:
A
B
0 / 1000

Question 14

Which of the following features can be used for operation auditing of HUAWEI CLOUD bastion hosts?
A report analysis
B. Double License
C. Work order management
D. Action playback

Mark Question:
Answer:

A, C, D


User Votes:
Discussions
vote your answer:
0 / 1000

Question 15

When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ensure
the security of user data operations.

  • A. Transmission security
  • B. Storage security
  • C. Destroy security
  • D. Collect security
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2