Huawei h12-731-v2-0 practice test

Exam Title: HCIE-Security (Written) V2.0

Last update: Nov 27 ,2025
Question 1

Which of the following does HiSec Insight's big data processing not include?

  • A. Data preprocessing
  • B. Flow data collection
  • C. Distributed storage
  • D. Distributed indexes
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Multi-factor authentication is mainly used in scenarios of login protection and operation protection.

  • A. TRUE
  • B. FALSE
Answer:

A


vote your answer:
A
B
A 0 B 0
Comments
Question 3

When there is a large amount of data (such as photos, videos or database files, etc.) that need to be
added and unsealed, the user can encrypt and decrypt the data by encrypting the data with the
number of watermarks, and the data can be encrypted and decrypted without transmitting a large
amount of data over the network

  • A. TRUE
  • B. FALSE
Answer:

B


vote your answer:
A
B
A 0 B 0
Comments
Question 4

Which of the following features can be used for operation auditing of HUAWEI CLOUD bastion hosts?
A report analysis
B. Double License
C. Work order management
D. Action playback

Answer:

A, C, D


vote your answer:
Comments
Question 5

When a user terminates the use of HUAWEI CLOUD services, as a service provider, we should ensure
the security of user data operations.

  • A. Transmission security
  • B. Storage security
  • C. Destroy security
  • D. Collect security
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

After you deploy HUAWEI CLOUD WAF Traffic to the tenant's Neb server is sent directly to the origin
server Cloud WAF intercepts and detects traffic whose destination IP address is the IP address of the
origin server.

  • A. TRUE
  • B. FALSE
Answer:

B


vote your answer:
A
B
A 0 B 0
Comments
Question 7

Which of the following services are security management services in HUAWEI CLOUD solutions?

  • A. DDOS Anti-DDoS Pro IP services
  • B. Situational awareness services
  • C. SSL certificate management service
  • D. Security Expert Services
Answer:

A BCD


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

The purpose of access control is to provide access to authorized subjects and prevent any
unauthorized and intentional access.

  • A. TRUE
  • B. FALSE
Answer:

A


vote your answer:
A
B
A 0 B 0
Comments
Question 9

When USG Firewall sends logs outward, it supports several different log information encapsulation
formats Which of the following items is a supported firewall format?

  • A. Netflow format
  • B. Datafl ow format
  • C. Binary format
  • D. Syslog format
Answer:

A, C, D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

USG firewall's DDoS attack prevention techniques include which of the following?

  • A. Current limiting technology
  • B. Cryptography
  • C. Fingerprint technology
  • D. Source detection technology
Answer:

ACD


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 27
Viewing questions 1-10 out of 277
Go To
page 2