Total Questions
100
Avec réponses
100
Dernière MAJ
11/03/2026
| # | Question | Propositions | Réponses | Date | Actions |
|---|---|---|---|---|---|
| 10 | Which of the following are general business requirements in the Carrier BG's user privacy protection management regulations? | 4 choix | 4 ✓ | 11/03/2026 | |
| 11 | Which of the following operations do not comply with the GTS Cooperation Strategy White Paper? | 4 choix | 4 ✓ | 11/03/2026 | |
| 12 | When implementing an operation, an FME must strictly follow the operation procedure to perform WFM dotting. After which of the following steps, the WFM task can't be cancelled? | 5 choix | 3 ✓ | 11/03/2026 | |
| 13 | The service tools provided or designated by the customer to Huawei employees can be used under the following conditions: | 4 choix | 3 ✓ | 11/03/2026 | |
| 14 | Which of the following aspects should Huawei consider in building privacy protection in business activities? | 6 choix | 6 ✓ | 11/03/2026 | |
| 15 | GTS cyber security inquiry email: | 4 choix | 1 ✓ | 11/03/2026 | |
| 16 | Which of the following principles must be followed for customer data processing? | 5 choix | 4 ✓ | 11/03/2026 | |
| 17 | Which of the following statements about the network operation observation phase after the change is implemented is correct? | 4 choix | 4 ✓ | 11/03/2026 | |
| 18 | Which of the following are the basic requirements for managing account passwords? | 4 choix | 4 ✓ | 11/03/2026 | |
| 19 | The validity period of the Cyber Security Service Work Certificate (CSC) is () years. | 4 choix | 1 ✓ | 11/03/2026 | |
| 20 | Three approvals include: | 4 choix | 3 ✓ | 11/03/2026 | |
| 21 | Which of the following Netcare Client network access authorization mode should be used when an accident occurs and the network access needs to be made immediately? | 4 choix | 1 ✓ | 11/03/2026 | |
| 22 | The remote access to customer network from China without the customer's written authorization is a () level cyber security violation. | 4 choix | 1 ✓ | 11/03/2026 | |
| 23 | Which of the following documents is Huawei's highest internal privacy protection document? | 4 choix | 1 ✓ | 11/03/2026 | |
| 24 | Which of the following is the definition of (): The "irreversible depersonalization" of personal data makes it impossible for the data controller and any other person to identify the relevant natural person within reasonable time, cost, and technology | 4 choix | 1 ✓ | 11/03/2026 | |
| 25 | Customer asks to do an additional operation which is not included in the MOP, shall I do it? | 2 choix | 1 ✓ | 11/03/2026 | |
| 26 | The full name of GDPR is | 4 choix | 1 ✓ | 11/03/2026 | |
| 27 | On which of the following platforms is the operation change rollback backtracking and tracking improvement tasks performed? | 4 choix | 1 ✓ | 11/03/2026 | |
| 28 | What is the longest period to clear the RFC quality and process audit violation? | 4 choix | 1 ✓ | 11/03/2026 | |
| 29 | WFM work orders are not mandatory for all change operations, such as network parameter modification, network performance optimization, and engineering interconnection. | 2 choix | 1 ✓ | 11/03/2026 | |
| 35 | Huawei employees can directly access the customer's network by using VPN accounts and token cards provided by customers. No further authorization is required. | 2 choix | 1 ✓ | 11/03/2026 | |
| 36 | GTS Cyber Security Behavior Redline Management Regulations is applicable to employees who have contact with customer network. Other GTS employees do not need to pay attention. | 2 choix | 1 ✓ | 11/03/2026 | |
| 37 | If urgent changes with medium or higher risks are to be implemented, or changes beyond the rep office trustlist are to be implemented during the day, the necessity must be strictly reviewed and exceptional approval must be obtained from the rep office CS director, account department FR, and vice general manager for delivery (except for emergency recovery scenarios). | 2 choix | 1 ✓ | 11/03/2026 | |
| 38 | Before transferring personal data across borders, any Huawei entity should consult the corresponding Data Protection Officer/ Legal Affairs Dept. Before transferring personal data out of the European Economic Area (EEA), the data transfer agreement required by the EU must be signed or the customer's explicit consent must be obtained. The entity that receives personal data must comply with the basic principles for personal data processing described in this document to provide adequate privacy protection. | 2 choix | 1 ✓ | 11/03/2026 | |
| 39 | After the device is put into commercial use or transferred to maintenance, engineers need to keep the customer network account and password to facilitate network maintenance. Do not ask customers to delete the account or change the password. | 2 choix | 1 ✓ | 11/03/2026 | |
| 40 | If a suspected service interruption occurs on the live network, locate and try to fix it first. If the fault cannot be solved, report to the SPM/CSM. | 2 choix | 1 ✓ | 11/03/2026 | |
| 41 | Cyber security crises are the doubts about Huawei's cyber security caused by existing cyber security incidents and the serious negative consequences that may be brought about. The perception of an impending cyber security event is not a crisis event. | 2 choix | 1 ✓ | 11/03/2026 | |
| 42 | Firewall configuration involves the security of the entire network and is highly customized. Specify requirements in the HLD and LLD phases and obtain the customer's approval or approval. | 2 choix | 1 ✓ | 11/03/2026 | |
| 43 | The engineering delivery period is tight. The director of the account department requires me to complete a change as soon as possible. Otherwise, he will complain to the PD. I estimate that the operation risk is low and I can perform the operation immediately. | 2 choix | 1 ✓ | 11/03/2026 | |
| 44 | Which of the followings are correct about the qualification requirements for MS network change severity level and technical reviewers? | 4 choix | 4 ✓ | 11/03/2026 | |
| 46 | What are the precautions for account management during the project? | 4 choix | 4 ✓ | 11/03/2026 | |
| 47 | What are the benefits of privacy protection for Huawei? | 6 choix | 6 ✓ | 11/03/2026 | |
| 48 | Which of the following is not a principle for clearing customer network accounts? | 4 choix | 1 ✓ | 11/03/2026 | |
| 49 | How to anonymize personal data? | 4 choix | 1 ✓ | 11/03/2026 | |
| 53 | It is the routine procedure to check the new link status before the TX link swap operation. After the FME arrives the site, he finds the new link is not available physically... In this case, the WFM task status should be set to | 3 choix | 1 ✓ | 11/03/2026 | |
| 54 | What is the network access management tool used in the Northern Africa Region? | 3 choix | 1 ✓ | 11/03/2026 | |
| 55 | Service tools are used to improve efficiency, reduce risks, and reduce technical requirements for engineers during service project sales or delivery. Tools are part of service product packages and are not directly sold to customers. | 2 choix | 1 ✓ | 11/03/2026 | |
| 56 | Transferring customer network data (including personal data) to China without written authorization from customers is a level-2 cyber security violation. | 2 choix | 1 ✓ | 11/03/2026 | |
| 57 | If a suspected service interruption occurs on the live network, locate and try to fix it first. If the fault cannot be solved, report it to the SPM/CSM. | 2 choix | 1 ✓ | 11/03/2026 | |
| 58 | Accountability for cyber security violations refers to the accountability of the direct owner of the violation. Other personnel who do not violate the violation will not be held accountable. | 2 choix | 1 ✓ | 11/03/2026 | |
| 59 | Firewall filtering rules are enabled based on the written or email approval of the customer. It is prohibited to define filtering rules. Undefined filtering rules remain in the blocked state. | 2 choix | 1 ✓ | 11/03/2026 | |
| 60 | After applying for an customer network account, you need to record the account information in the account management system of NetCareCloud. If no customer network account is recorded in the system, the operation is not allowed. | 2 choix | 1 ✓ | 11/03/2026 | |
| 61 | I have arrived the equipment room before the network change starts. To avoid forgetting the WFM dotting during the operaiton, I finish the WFM dotting from start to complate as soon as I arrive the site. | 2 choix | 1 ✓ | 11/03/2026 | |
| 62 | All accounts that can be used to access the customer network must be approved by the project team before being applied to the customer. | 2 choix | 1 ✓ | 11/03/2026 | |
| 63 | To relieve Huawei from the liability of unauthorized conversion from processor to controller, the technical service engineers of the representative office should adopt the NOTICE method when providing spare parts services, regardless of whether the materials contain personal data. | 2 choix | 1 ✓ | 11/03/2026 | |
| 64 | The Netcare Client emergency mode applies to the following scenarios: | 8 choix | 2 ✓ | 11/03/2026 | |
| 66 | How often does Netcare Client require a full-disk virus scan? | 4 choix | 1 ✓ | 11/03/2026 | |
| 68 | What is the highest platform of Huawei? | 4 choix | 1 ✓ | 11/03/2026 | |
| 70 | If the operation has no impact on the network, do we need to apply for written authorization from the customer? | 2 choix | 1 ✓ | 11/03/2026 | |
| 72 | Which of the following are the general principles in GTS customer network Account Security Management Requirements? | 4 choix | 3 ✓ | 11/03/2026 | |
| 73 | What are the consequences of violating privacy protection laws and regulations for Huawei? | 4 choix | 4 ✓ | 11/03/2026 | |
| 74 | Which of the following qualifications are required before access to the customer network? | 4 choix | 2 ✓ | 11/03/2026 | |
| 76 | () is the primary owner and organizer of cyber security management of the maintenance project team. | 4 choix | 1 ✓ | 11/03/2026 | |
| 77 | Is it necessary to apply the written authorization from the customer for the operation without impact to the network service but beyond the scope approved by the customer before? | 2 choix | 1 ✓ | 11/03/2026 | |
| 79 | After a customer network account user resigns or is transferred to another position or the customer's network work ends, notify the customer in writing to delete the customer's network account or change the password. | 2 choix | 1 ✓ | 11/03/2026 | |
| 80 | If the corporate user privacy protection management policy conflicts with local laws and regulations, the corporate policy shall prevail. | 2 choix | 1 ✓ | 11/03/2026 | |
| 81 | For countries and regions that are not sensitive to cyber security, spare parts cyber security and privacy protection policies are implemented based on local laws or customer requirements. | 2 choix | 1 ✓ | 11/03/2026 | |
| 83 | The service is not down but the data traffic volume decreases by 30%, and the 4G service is unavailable but the 3G service is normal, it is not necessary to report the problem to CSM for accident severity estimation. | 2 choix | 1 ✓ | 11/03/2026 | |
| 84 | Remote access to customer network in sensitive countries from China is strictly prohibited. | 2 choix | 1 ✓ | 11/03/2026 | |
| 85 | Long-term authorization refers to the one-time authorization for common issues or operations required by the customer, and the agreement reached with the customer in advance to simplify the subsequent procedures between the customer and Huawei. | 2 choix | 1 ✓ | 11/03/2026 | |
| 89 | Personal data means any information relating to a natural person ("data subject") whose identity has been identified or whose identity is identifiable | 2 choix | 1 ✓ | 11/03/2026 | |
| 91 | Which of the following may result from the disclosure of sensitive personal data? | 5 choix | 5 ✓ | 11/03/2026 | |
| 99 | If the operation rollback happens, within how many days should finish the backtracking? | 4 choix | 1 ✓ | 11/03/2026 | |
| 100 | Which of the following emails can be used to provide feedback on cyber security crises or related leads discovered by employees and external customers? | 4 choix | 1 ✓ | 11/03/2026 | |
| 103 | If the real duration of a major operation exceeds the authorized period or the steps exceed the authorized scope, it is not necessary to be approved by the customer/project team again. | 2 choix | 1 ✓ | 11/03/2026 | |
| 104 | It is prohibited to transfer customer network data (including personal data) from cyber security sensitive countries to China. However, in special cases, it is allowed to obtain written authorization from customers. | 2 choix | 1 ✓ | 11/03/2026 | |
| 105 | Remote access to the customer network is not allowed in places outside the office (such as hotels and dormitories). | 2 choix | 1 ✓ | 11/03/2026 | |
| 106 | Obtain the customer's authorization before the customer network data (including personal data) is transferred back to China. | 2 choix | 1 ✓ | 11/03/2026 | |
| 107 | The Cyber Security Service Work Certificate (CSC) is applicable to Huawei employees. Supplier resources that are in contact with customer network are managed by suppliers and are not covered by this certificate. | 2 choix | 1 ✓ | 11/03/2026 | |
| 108 | The engineer can share accounts with others if his supervisor approves. | 2 choix | 1 ✓ | 11/03/2026 | |
| 109 | The authorization letter for obtaining the customer network account must specify the user, purpose, place, and validity period of the customer's network account. | 2 choix | 1 ✓ | 11/03/2026 | |
| 110 | Obtain the customer's authorization for returning the original package of the representative office. | 2 choix | 1 ✓ | 11/03/2026 | |
| 111 | To quickly locate network problems, you can obtain some gadget software from R&D engineers and use it in customer network. | 2 choix | 1 ✓ | 11/03/2026 | |
| 113 | After anonymization, personal data is no longer personal data and does not need to be processed according to basic principles of personal data processing. | 2 choix | 1 ✓ | 11/03/2026 | |
| 114 | All engineers in the Rep. Office can report the accident to GTAC. | 2 choix | 1 ✓ | 11/03/2026 | |
| 122 | Which of the following are the main measures for controlling cyber security and privacy protection in spare parts management? | 4 choix | 3 ✓ | 11/03/2026 | |
| 123 | If the operation rollback happens, on which platform should perform the backtracking? | 4 choix | 1 ✓ | 11/03/2026 | |
| 125 | Which of the following is not personal data? () | 5 choix | 1 ✓ | 11/03/2026 | |
| 128 | customer network What should I do if an emergency occurs but the customer cannot provide written authorization in time? | 4 choix | 1 ✓ | 11/03/2026 | |
| 130 | Modular control countries and regions include | 4 choix | 1 ✓ | 11/03/2026 | |
| 132 | Which of the following does not belong to the customer-provided service tool requirement? | 4 choix | 1 ✓ | 11/03/2026 | |
| 133 | Which of the following is the latest EU privacy protection regulation that will take effect in May 2018? | 4 choix | 1 ✓ | 11/03/2026 | |
| 135 | The data minimization principle in the Huawei Privacy Protection Policy indicates that personal data should be related to the data processing purpose, appropriate, and necessary. Personal data should be anonymized as far as possible. | 2 choix | 1 ✓ | 11/03/2026 | |
| 143 | All the operations that may affect the stable running of equipment on the live network, normal monitoring of the NMS, or normal running of services on the live network are defined as the live network operations, which includes but not be limited to modify network planning and optimization parameters, to load IFOS refarming solutions, to load UMTS downlink simulation, to perform UMTS uplink desensitization, to do data collection, to do signaling trace which may affect network resources, to do network inspection, to do Discovery server network commissioning, and to upgrade the Discovery software version and etc. | 2 choix | 1 ✓ | 11/03/2026 | |
| 146 | The current cyber security control countries/regions include () cyber security sensitive countries and () new modular control countries/regions. | 4 choix | 1 ✓ | 11/03/2026 | |
| 150 | Which of the following scenarios is not a level-1 cyber security violation? | 4 choix | 1 ✓ | 11/03/2026 | |
| 152 | Which of the following principles must be followed for the access control and security configuration of firewalls? | 4 choix | 1 ✓ | 11/03/2026 | |
| 156 | The customer's authorization is valid in the form of verbal authorization, such as on-site customer accompaniment or telephone permission. The customer's instructions are objectively described in the problem analysis report or service report provided to the customer to show that the service process is completed according to the customer's instructions. | 2 choix | 1 ✓ | 11/03/2026 | |
| 158 | Before PAC, the network or system integration service operation does not need to obtain the customer's authorization because the network has not been put into commercial use or handed over to the customer. | 2 choix | 1 ✓ | 11/03/2026 | |
| 160 | Since only me knowing XX problem well in the whole Rep. Office, I can develop the network change solution and review it all by myself if the severity is lower than 4 points. | 2 choix | 1 ✓ | 11/03/2026 | |
| 162 | If the customer does not specify the storage period of personal data, Huawei can retain the data for a long time. | 2 choix | 1 ✓ | 11/03/2026 | |
| 165 | After operation rollback, but the root cause is not yet found, we should: | 4 choix | 2 ✓ | 11/03/2026 | |
| 173 | Which of the following scenarios may cause cyber security crises? | 5 choix | 4 ✓ | 11/03/2026 | |
| 175 | Common customer authorization modes include: | 5 choix | 5 ✓ | 11/03/2026 | |
| 177 | It is the routine procedure to check the new link status before the TX link swap operation. After the FME arrives the site, he finds the new link is not available physically, which makes the operation must be postponed. After reporting to the customer, the customer confirmed to postponed the operation. In this case, the WFM task status should be set to | 3 choix | 1 ✓ | 11/03/2026 | |
| 185 | Which customer network issues can be handled without Romania GTAC? | 4 choix | 1 ✓ | 11/03/2026 | |
| 190 | Officially released versions and tools must be used in strict accordance with the application scenarios and scope specified in the manual, as well as the EOX announcement and product change notice. | 2 choix | 1 ✓ | 11/03/2026 | |
| 193 | The failure to use software versions, patches, licenses, and tools from Huawei's official channels is a level-2 cyber security violation. | 2 choix | 1 ✓ | 11/03/2026 | |
| 194 | To restore services in an emergency, you can directly install the patch sent by R&D engineers. | 2 choix | 1 ✓ | 11/03/2026 | |
| 195 | The Customer is the sole arbiter of the network security configuration of the Firewall Product and cannot be replaced by any third party, such as the Agent or Customer Partner, unless the third party is formally authorized by the Customer in writing. | 2 choix | 1 ✓ | 11/03/2026 |
Aucune question ne correspond à votre recherche.