Questions
Admin

Total Questions

100

Avec réponses

100

Dernière MAJ

11/03/2026

Toutes les questions

# Question Propositions Réponses Date Actions
10 Which of the following are general business requirements in the Carrier BG's user privacy protection management regulations? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
11 Which of the following operations do not comply with the GTS Cooperation Strategy White Paper? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
12 When implementing an operation, an FME must strictly follow the operation procedure to perform WFM dotting. After which of the following steps, the WFM task can't be cancelled? 5 proposition(s) 5 choix 3 ✓ 11/03/2026
Modifier
13 The service tools provided or designated by the customer to Huawei employees can be used under the following conditions: 4 proposition(s) 4 choix 3 ✓ 11/03/2026
Modifier
14 Which of the following aspects should Huawei consider in building privacy protection in business activities? 6 proposition(s) 6 choix 6 ✓ 11/03/2026
Modifier
15 GTS cyber security inquiry email: 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
16 Which of the following principles must be followed for customer data processing? 5 proposition(s) 5 choix 4 ✓ 11/03/2026
Modifier
17 Which of the following statements about the network operation observation phase after the change is implemented is correct? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
18 Which of the following are the basic requirements for managing account passwords? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
19 The validity period of the Cyber Security Service Work Certificate (CSC) is () years. 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
20 Three approvals include: 4 proposition(s) 4 choix 3 ✓ 11/03/2026
Modifier
21 Which of the following Netcare Client network access authorization mode should be used when an accident occurs and the network access needs to be made immediately? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
22 The remote access to customer network from China without the customer's written authorization is a () level cyber security violation. 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
23 Which of the following documents is Huawei's highest internal privacy protection document? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
24 Which of the following is the definition of (): The "irreversible depersonalization" of personal data makes it impossible for the data controller and any other person to identify the relevant natural person within reasonable time, cost, and technology 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
25 Customer asks to do an additional operation which is not included in the MOP, shall I do it? 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
26 The full name of GDPR is 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
27 On which of the following platforms is the operation change rollback backtracking and tracking improvement tasks performed? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
28 What is the longest period to clear the RFC quality and process audit violation? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
29 WFM work orders are not mandatory for all change operations, such as network parameter modification, network performance optimization, and engineering interconnection. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
35 Huawei employees can directly access the customer's network by using VPN accounts and token cards provided by customers. No further authorization is required. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
36 GTS Cyber Security Behavior Redline Management Regulations is applicable to employees who have contact with customer network. Other GTS employees do not need to pay attention. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
37 If urgent changes with medium or higher risks are to be implemented, or changes beyond the rep office trustlist are to be implemented during the day, the necessity must be strictly reviewed and exceptional approval must be obtained from the rep office CS director, account department FR, and vice general manager for delivery (except for emergency recovery scenarios). 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
38 Before transferring personal data across borders, any Huawei entity should consult the corresponding Data Protection Officer/ Legal Affairs Dept. Before transferring personal data out of the European Economic Area (EEA), the data transfer agreement required by the EU must be signed or the customer's explicit consent must be obtained. The entity that receives personal data must comply with the basic principles for personal data processing described in this document to provide adequate privacy protection. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
39 After the device is put into commercial use or transferred to maintenance, engineers need to keep the customer network account and password to facilitate network maintenance. Do not ask customers to delete the account or change the password. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
40 If a suspected service interruption occurs on the live network, locate and try to fix it first. If the fault cannot be solved, report to the SPM/CSM. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
41 Cyber security crises are the doubts about Huawei's cyber security caused by existing cyber security incidents and the serious negative consequences that may be brought about. The perception of an impending cyber security event is not a crisis event. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
42 Firewall configuration involves the security of the entire network and is highly customized. Specify requirements in the HLD and LLD phases and obtain the customer's approval or approval. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
43 The engineering delivery period is tight. The director of the account department requires me to complete a change as soon as possible. Otherwise, he will complain to the PD. I estimate that the operation risk is low and I can perform the operation immediately. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
44 Which of the followings are correct about the qualification requirements for MS network change severity level and technical reviewers? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
46 What are the precautions for account management during the project? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
47 What are the benefits of privacy protection for Huawei? 6 proposition(s) 6 choix 6 ✓ 11/03/2026
Modifier
48 Which of the following is not a principle for clearing customer network accounts? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
49 How to anonymize personal data? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
53 It is the routine procedure to check the new link status before the TX link swap operation. After the FME arrives the site, he finds the new link is not available physically... In this case, the WFM task status should be set to 3 proposition(s) 3 choix 1 ✓ 11/03/2026
Modifier
54 What is the network access management tool used in the Northern Africa Region? 3 proposition(s) 3 choix 1 ✓ 11/03/2026
Modifier
55 Service tools are used to improve efficiency, reduce risks, and reduce technical requirements for engineers during service project sales or delivery. Tools are part of service product packages and are not directly sold to customers. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
56 Transferring customer network data (including personal data) to China without written authorization from customers is a level-2 cyber security violation. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
57 If a suspected service interruption occurs on the live network, locate and try to fix it first. If the fault cannot be solved, report it to the SPM/CSM. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
58 Accountability for cyber security violations refers to the accountability of the direct owner of the violation. Other personnel who do not violate the violation will not be held accountable. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
59 Firewall filtering rules are enabled based on the written or email approval of the customer. It is prohibited to define filtering rules. Undefined filtering rules remain in the blocked state. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
60 After applying for an customer network account, you need to record the account information in the account management system of NetCareCloud. If no customer network account is recorded in the system, the operation is not allowed. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
61 I have arrived the equipment room before the network change starts. To avoid forgetting the WFM dotting during the operaiton, I finish the WFM dotting from start to complate as soon as I arrive the site. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
62 All accounts that can be used to access the customer network must be approved by the project team before being applied to the customer. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
63 To relieve Huawei from the liability of unauthorized conversion from processor to controller, the technical service engineers of the representative office should adopt the NOTICE method when providing spare parts services, regardless of whether the materials contain personal data. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
64 The Netcare Client emergency mode applies to the following scenarios: 8 proposition(s) 8 choix 2 ✓ 11/03/2026
Modifier
66 How often does Netcare Client require a full-disk virus scan? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
68 What is the highest platform of Huawei? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
70 If the operation has no impact on the network, do we need to apply for written authorization from the customer? 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
72 Which of the following are the general principles in GTS customer network Account Security Management Requirements? 4 proposition(s) 4 choix 3 ✓ 11/03/2026
Modifier
73 What are the consequences of violating privacy protection laws and regulations for Huawei? 4 proposition(s) 4 choix 4 ✓ 11/03/2026
Modifier
74 Which of the following qualifications are required before access to the customer network? 4 proposition(s) 4 choix 2 ✓ 11/03/2026
Modifier
76 () is the primary owner and organizer of cyber security management of the maintenance project team. 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
77 Is it necessary to apply the written authorization from the customer for the operation without impact to the network service but beyond the scope approved by the customer before? 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
79 After a customer network account user resigns or is transferred to another position or the customer's network work ends, notify the customer in writing to delete the customer's network account or change the password. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
80 If the corporate user privacy protection management policy conflicts with local laws and regulations, the corporate policy shall prevail. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
81 For countries and regions that are not sensitive to cyber security, spare parts cyber security and privacy protection policies are implemented based on local laws or customer requirements. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
83 The service is not down but the data traffic volume decreases by 30%, and the 4G service is unavailable but the 3G service is normal, it is not necessary to report the problem to CSM for accident severity estimation. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
84 Remote access to customer network in sensitive countries from China is strictly prohibited. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
85 Long-term authorization refers to the one-time authorization for common issues or operations required by the customer, and the agreement reached with the customer in advance to simplify the subsequent procedures between the customer and Huawei. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
89 Personal data means any information relating to a natural person ("data subject") whose identity has been identified or whose identity is identifiable 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
91 Which of the following may result from the disclosure of sensitive personal data? 5 proposition(s) 5 choix 5 ✓ 11/03/2026
Modifier
99 If the operation rollback happens, within how many days should finish the backtracking? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
100 Which of the following emails can be used to provide feedback on cyber security crises or related leads discovered by employees and external customers? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
103 If the real duration of a major operation exceeds the authorized period or the steps exceed the authorized scope, it is not necessary to be approved by the customer/project team again. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
104 It is prohibited to transfer customer network data (including personal data) from cyber security sensitive countries to China. However, in special cases, it is allowed to obtain written authorization from customers. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
105 Remote access to the customer network is not allowed in places outside the office (such as hotels and dormitories). 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
106 Obtain the customer's authorization before the customer network data (including personal data) is transferred back to China. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
107 The Cyber Security Service Work Certificate (CSC) is applicable to Huawei employees. Supplier resources that are in contact with customer network are managed by suppliers and are not covered by this certificate. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
108 The engineer can share accounts with others if his supervisor approves. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
109 The authorization letter for obtaining the customer network account must specify the user, purpose, place, and validity period of the customer's network account. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
110 Obtain the customer's authorization for returning the original package of the representative office. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
111 To quickly locate network problems, you can obtain some gadget software from R&D engineers and use it in customer network. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
113 After anonymization, personal data is no longer personal data and does not need to be processed according to basic principles of personal data processing. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
114 All engineers in the Rep. Office can report the accident to GTAC. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
122 Which of the following are the main measures for controlling cyber security and privacy protection in spare parts management? 4 proposition(s) 4 choix 3 ✓ 11/03/2026
Modifier
123 If the operation rollback happens, on which platform should perform the backtracking? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
125 Which of the following is not personal data? () 5 proposition(s) 5 choix 1 ✓ 11/03/2026
Modifier
128 customer network What should I do if an emergency occurs but the customer cannot provide written authorization in time? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
130 Modular control countries and regions include 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
132 Which of the following does not belong to the customer-provided service tool requirement? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
133 Which of the following is the latest EU privacy protection regulation that will take effect in May 2018? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
135 The data minimization principle in the Huawei Privacy Protection Policy indicates that personal data should be related to the data processing purpose, appropriate, and necessary. Personal data should be anonymized as far as possible. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
143 All the operations that may affect the stable running of equipment on the live network, normal monitoring of the NMS, or normal running of services on the live network are defined as the live network operations, which includes but not be limited to modify network planning and optimization parameters, to load IFOS refarming solutions, to load UMTS downlink simulation, to perform UMTS uplink desensitization, to do data collection, to do signaling trace which may affect network resources, to do network inspection, to do Discovery server network commissioning, and to upgrade the Discovery software version and etc. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
146 The current cyber security control countries/regions include () cyber security sensitive countries and () new modular control countries/regions. 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
150 Which of the following scenarios is not a level-1 cyber security violation? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
152 Which of the following principles must be followed for the access control and security configuration of firewalls? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
156 The customer's authorization is valid in the form of verbal authorization, such as on-site customer accompaniment or telephone permission. The customer's instructions are objectively described in the problem analysis report or service report provided to the customer to show that the service process is completed according to the customer's instructions. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
158 Before PAC, the network or system integration service operation does not need to obtain the customer's authorization because the network has not been put into commercial use or handed over to the customer. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
160 Since only me knowing XX problem well in the whole Rep. Office, I can develop the network change solution and review it all by myself if the severity is lower than 4 points. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
162 If the customer does not specify the storage period of personal data, Huawei can retain the data for a long time. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
165 After operation rollback, but the root cause is not yet found, we should: 4 proposition(s) 4 choix 2 ✓ 11/03/2026
Modifier
173 Which of the following scenarios may cause cyber security crises? 5 proposition(s) 5 choix 4 ✓ 11/03/2026
Modifier
175 Common customer authorization modes include: 5 proposition(s) 5 choix 5 ✓ 11/03/2026
Modifier
177 It is the routine procedure to check the new link status before the TX link swap operation. After the FME arrives the site, he finds the new link is not available physically, which makes the operation must be postponed. After reporting to the customer, the customer confirmed to postponed the operation. In this case, the WFM task status should be set to 3 proposition(s) 3 choix 1 ✓ 11/03/2026
Modifier
185 Which customer network issues can be handled without Romania GTAC? 4 proposition(s) 4 choix 1 ✓ 11/03/2026
Modifier
190 Officially released versions and tools must be used in strict accordance with the application scenarios and scope specified in the manual, as well as the EOX announcement and product change notice. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
193 The failure to use software versions, patches, licenses, and tools from Huawei's official channels is a level-2 cyber security violation. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
194 To restore services in an emergency, you can directly install the patch sent by R&D engineers. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
195 The Customer is the sole arbiter of the network security configuration of the Firewall Product and cannot be replaced by any third party, such as the Agent or Customer Partner, unless the third party is formally authorized by the Customer in writing. 2 proposition(s) 2 choix 1 ✓ 11/03/2026
Modifier
Aucune question ne correspond à votre recherche.