Beruflich Dokumente
Kultur Dokumente
1.True or False
True False
2.True or False
True False
3.True or False
True False
4.True or False
The super user and password must be managed by the customer. If network
operations must use the super user for login, you must apply to the
customer first and then remind the customer timely to change the
password the minute you complete the operation.
True False
5.True or False
All the change operations on the live network must get "three approvals"
(customer approval, approval of the project team, and technical
approval).
True False
6.True or False
True False
7.True or False
The cyber security redlines are conditional requirements, and must give
top priority to business needs when it conflicts with the business.
True False
8.True or False
True False
9.True or False
True False
10.True or False
After the field service is finished, clean up all temporary content
related to the customer in the process of the service (for example,
delete the process data and cancel the login account). If certain
temporary content needs to be reserved for the follow-up work, you must
obtain the written approval from the customer.
True False
A maintenance engineer uses the login accounts and passwords for the
customer network stored in a coworker computer to access the customer
network remotely and resolve the issue. After investigation, it is
discovered that the login accounts were authorized by the customer six
months ago, and the validity period was only 10 days.Which of the
following statements is INCORRECT?
a.Cyber security feedback is the duty of cyber security teams and not
related to normal employees.
c.You can give feedback or seek help from local lawyers and cyber
security contacts.
a.E-mail
b.Meeting minutes
c.Fax
d.Verbal commitment
e.Service application
c.Delete and destroy the customer network data after the customer
authorization expires.
d.Spread and use the shared account and password without the
customer's written authorization.
Send the data that contains personal information in the carrier network
to the headquarters for troubleshooting analysis, which of the following
statements is INCORRECT?
d.Ask for advice from the manager and cyber security department if
you do not know how to deal with it.
b.The Support website and the product catalog are legal publication
and download platform. All the tools (including the frontline custom
tools) must be released on the legal platform. Employees can download
software from only the Support website, product catalogs, and use
software tools within the specified scope.
b.Avoid and reduce the use of personal data, anonymize the data or
use pseudonyms as much as possible according to local laws.
c.Take appropriate technical and organizational measures to protect
personal data and prevent illegal processing of the data in any form.
a.Sell user materials, such as user names and phone numbers, obtained
from work to others.
d.Transfer of personal data from the European Economic Area (EEA) and
other sensitive countries should comply with local laws and regulations.
What controls does service engineer put around the use of laptops or
engineering technology their engineers carry? For example, can the
service engineers load their own software tools onto their laptop?
b.To protect the customer network and data security, our corporation
has strict computer configuration and customer network access
requirements. The software in the work computers must be installed
through Huawei iDesk tool or by Huawei IT personnel.
d.Do not spread cyber security cases, which may easily cause any
misunderstanding about Huawei, such as security baselines and security
alarms.