Huawei H12-731-V2-0 Exam Questions

Questions for the H12-731-V2-0 were updated on : Dec 01 ,2025

Page 1 out of 19. Viewing questions 1-15 out of 277

Question 1

In the Linux log security settings Which of the following options is included in the user operational
log? (multiple selection).

  • A. Permission modification
  • B. Account creation
  • C. Password modification
  • D. Whether the login is successful
Answer:

ABC

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

WAF devices cannot deploy DDoS protection against web websites

  • A. TRUE
  • B. FALSE
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 3

Which of the following attacks can be detected by a point device. (Single selection)

  • A. Delete the process
  • B. Encrypt malicious traffic
  • C. Password brute force cracking
  • D. User privilege elevation
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

In the stage of incident response What do the following security personnel need to do? (Selection).

  • A. Perform root cause analysis
  • B. Control events
  • C. Collect evidence
  • D. Rebuild the system
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

XSS vulnerabilities are injection vulnerabilities formed by sending invalid database commands

  • A. TRUE
  • B. FALSE
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 6

The following description of deploying the CIS data ingestation feature is correct? (single selection).

  • A. When the log collector transmits logs to the big data platform It is recommended to use SSL Because the SSL method is more secure But the overhead is greater.
  • B. By deploying the image function on the stream probe , the Netflow data stream is sent to the big data platform.
  • C. Syslog B aims to normalize before reporting to the big data platform But Netflow B does not normalize.
  • D. By deploying the spectroscopic function on the flow probe Send information elements to the big data platform.
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

If the attacker uses a fake address to launch a TCP flood attack Which of the following defenses is
most effective? (single).

  • A. Source verification
  • B. Fingerprint learning
  • C. Session checking
  • D. Load inspection
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following options is a major cause of business disruption in the cloud? (multiple
selection).

  • A. Vulnerabilities
  • B. Data breach
  • C. Cyber attacks
  • D. Viruses
Answer:

ACD

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Let's take the L2TP over IPSec in the dual-machine scenario What is wrong with the description is the
egg? (single selection).

  • A. In this scenario, Fireproof will assign an IP address to the client
  • B. After the L2TF tunnel is established, the user cannot access the Internet normally
  • C. The parameters set by the client should match the parameters set on the firewall.
  • D. The client should initiate a dial-up connection to the virtual address of the dual machine.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Huawei proposes • Partition Defense Unified Detection - Security Scheme Which of the following
partitions requires a summer firewall").

  • A. Internet boundaries
  • B. Business service area
  • C. Office network
  • D. Core exchange area
Answer:

ABC

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

The following describes the implementation of server IP address planning in the firewall server load
balancing function, which are the correct items? (multiple selection).

  • A. It cannot be the same as the virtualization server address
  • B. It cannot be the same as the address of other servers on the Internet
  • C. It cannot be the same as the IP address of the server
  • D. Cannot be intertwined with the outgoing IP address of the FW
Answer:

ACD

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

The Pv6 multicast address range is FE80::/10

  • A. TRUE
  • B. FALSE
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 13

The following describes the hot standby of the dual machine What are the wrong items? (multiple
selection).

  • A. Under the condition that the firewall service interface works at Layer 2 and connects the router upstream and downstream It is recommended to use a staff-sharing network.
  • B. Under the condition that the firewall service interface works at Layer 2 and connects the switch upstream and downstream Support staff sharing networking
  • C. The firewall service interface works in the case of three-layer, uplink and downlink connection to the router You can use primary/standby networking.
  • D. The firewall service interface works under the networking condition of Layer 3, uplink and downlink connecting routers You cannot use load-sharing groups.
Answer:

BD

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following authentication methods is password authentication? (single selection).

  • A. What do you have
  • B. What do you do
  • C. What you are
  • D. What do you know
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

If you are deploying a WAF appliance in your network for the first time, which is the correct option
for the WAF configuration process sequencing? (single).
1,
View logs Understand security events in your network
2,
Add protection sites
3,
Custom rule groups
4,
After going live, the strategy is adjusted

  • A. 1-2-3-4
  • B. 3-2-1-4
  • C. 3-1-2-4.
  • D. 1-3-2-4
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2