ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Which of the following options are correct regarding the description of Windows log event types?

(multiple choice)

Warning events are events that refer to the successful operation of an application, driver, or service.
Warning events are events that refer to the successful operation of an application, driver, or service.
False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.
False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.
When the disk space is insufficient, it will be recorded as an "information event"
When the disk space is insufficient, it will be recorded as an "information event"
Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.
Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.
Suggested answer: B, D
asked 18/09/2024
james campbell
38 questions

Question 2

Report Export Collapse

Which of the following types of encryption technology can be divided into? (multiple choice)

Symmetric encryption
Symmetric encryption
Symmetric encryption
Symmetric encryption
fingerprint encryption
fingerprint encryption
data encryption
data encryption
Suggested answer: A, B
asked 18/09/2024
alex aguirre
43 questions

Question 3

Report Export Collapse

Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)

session table
session table
ServerMapentry
ServerMapentry
Dynamic blacklist
Dynamic blacklist
routing table
routing table
Suggested answer: A, B, C
asked 18/09/2024
JOSEPH KASULE
27 questions

Question 4

Report Export Collapse

Which of the following isP2DRThe core part of the model?

PolicyStrategy
PolicyStrategy
Protectionprotection
Protectionprotection
Detectiondetect
Detectiondetect
Responseresponse
Responseresponse
Suggested answer: A
asked 18/09/2024
Sterling White
47 questions

Question 5

Report Export Collapse

Evidence identification needs to address the verification of the integrity of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the criteria for identification of evidence?

The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.
The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.
The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.
The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.
The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.
The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.
The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.
The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.
Suggested answer: A
asked 18/09/2024
Angelo Gulisano
36 questions

Question 6

Report Export Collapse

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?

Cryptography, data decryption technology
Cryptography, data decryption technology
Digital Abstract Analysis Technology of Documents
Digital Abstract Analysis Technology of Documents
Techniques for discovering connections between different pieces of evidence
Techniques for discovering connections between different pieces of evidence
Spam Tracking Technology
Spam Tracking Technology
Suggested answer: D
asked 18/09/2024
David Vicente Martinez
33 questions

Question 7

Report Export Collapse

aboutAHandESPSecurity protocol, which of the following options is true? (multiple choice)

AHCan provide encryption and authentication functions
AHCan provide encryption and authentication functions
ESPCan provide encryption and authentication functions
ESPCan provide encryption and authentication functions
AH The protocol number is51
AH The protocol number is51
ESPThe protocol number is51
ESPThe protocol number is51
Suggested answer: B, C
asked 18/09/2024
Jérémy FRAISSENET
33 questions

Question 8

Report Export Collapse

Which of the following DDoS attack types is an attack?

snooping scan attack
snooping scan attack
Malformed Packet Attack
Malformed Packet Attack
special packet attack
special packet attack
traffic attack
traffic attack
Suggested answer: D
asked 18/09/2024
Philippe Chretien
44 questions

Question 9

Report Export Collapse

aboutSSL VPNTechnology, which of the following statements is false?

SSL VPNtechnology can be perfectly adapted toNATthrough the scene
SSL VPNtechnology can be perfectly adapted toNATthrough the scene
SSL VPNThe encryption of the technology only takes effect at the application layer
SSL VPNThe encryption of the technology only takes effect at the application layer
SSL VPNRequires a dial-up client
SSL VPNRequires a dial-up client
SSL VPNTechnology expands the reach of the enterprise's network
SSL VPNTechnology expands the reach of the enterprise's network
Suggested answer: C
asked 18/09/2024
wilson tan
45 questions

Question 10

Report Export Collapse

Which of the following options can bewindowsDo you do it in the advanced settings of the firewall?

(multiple choice)

Restore defaults
Restore defaults
Change notification rules
Change notification rules
Set up connection security rules
Set up connection security rules
Set up inbound and outbound rules
Set up inbound and outbound rules
Suggested answer: C, D
asked 18/09/2024
Rahul Manikpuri
36 questions
Total 497 questions
Go to page: of 50