ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers

Question list
Search
Search

Related questions











Which of the following options are correct regarding the description of Windows log event types?

(multiple choice)

A.
Warning events are events that refer to the successful operation of an application, driver, or service.
A.
Warning events are events that refer to the successful operation of an application, driver, or service.
Answers
B.
False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.
B.
False events generally refer to loss of functionality and data. For example, a service that cannot be loaded as a system boot will generate an error event.
Answers
C.
When the disk space is insufficient, it will be recorded as an "information event"
C.
When the disk space is insufficient, it will be recorded as an "information event"
Answers
D.
Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.
D.
Failed audit events refer to failed audit security logon attempts, such as failure to access a network drive from a user's view, will be logged as a failed audit event.
Answers
Suggested answer: B, D

Which of the following types of encryption technology can be divided into? (multiple choice)

A.
Symmetric encryption
A.
Symmetric encryption
Answers
B.
Symmetric encryption
B.
Symmetric encryption
Answers
C.
fingerprint encryption
C.
fingerprint encryption
Answers
D.
data encryption
D.
data encryption
Answers
Suggested answer: A, B

Which of the following are HRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)

A.
session table
A.
session table
Answers
B.
ServerMapentry
B.
ServerMapentry
Answers
C.
Dynamic blacklist
C.
Dynamic blacklist
Answers
D.
routing table
D.
routing table
Answers
Suggested answer: A, B, C

Which of the following isP2DRThe core part of the model?

A.
PolicyStrategy
A.
PolicyStrategy
Answers
B.
Protectionprotection
B.
Protectionprotection
Answers
C.
Detectiondetect
C.
Detectiondetect
Answers
D.
Responseresponse
D.
Responseresponse
Answers
Suggested answer: A

Evidence identification needs to address the verification of the integrity of the evidence and determine whether it meets the applicable standards. Which of the following statements is correct about the criteria for identification of evidence?

A.
The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.
A.
The relevance standard means that if the telephony evidence can have a substantial impact on the facts of the case to a certain extent, the court should rule that it is relevant.
Answers
B.
The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.
B.
The standard of objectivity means that the acquisition, storage, and submission of electronic evidence should be legal, and not constitute a serious violation of basic rights such as national interests, social welfare, and personal privacy.
Answers
C.
The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.
C.
The standard of legality is to ensure that the content of electronic evidence remains unchanged from the initial acquisition and collection to the submission and use as litigation evidence.
Answers
D.
The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.
D.
The standard of fairness refers to the evidentiary material obtained by the legal subject through legal means, which has evidential capacity.
Answers
Suggested answer: A

Data analysis technology is to find and match keywords or key phrases in the acquired data stream or information stream, and analyze the correlation of time. Which of the following is not an evidence analysis technique?

A.
Cryptography, data decryption technology
A.
Cryptography, data decryption technology
Answers
B.
Digital Abstract Analysis Technology of Documents
B.
Digital Abstract Analysis Technology of Documents
Answers
C.
Techniques for discovering connections between different pieces of evidence
C.
Techniques for discovering connections between different pieces of evidence
Answers
D.
Spam Tracking Technology
D.
Spam Tracking Technology
Answers
Suggested answer: D

aboutAHandESPSecurity protocol, which of the following options is true? (multiple choice)

A.
AHCan provide encryption and authentication functions
A.
AHCan provide encryption and authentication functions
Answers
B.
ESPCan provide encryption and authentication functions
B.
ESPCan provide encryption and authentication functions
Answers
C.
AH The protocol number is51
C.
AH The protocol number is51
Answers
D.
ESPThe protocol number is51
D.
ESPThe protocol number is51
Answers
Suggested answer: B, C

Which of the following DDoS attack types is an attack?

A.
snooping scan attack
A.
snooping scan attack
Answers
B.
Malformed Packet Attack
B.
Malformed Packet Attack
Answers
C.
special packet attack
C.
special packet attack
Answers
D.
traffic attack
D.
traffic attack
Answers
Suggested answer: D

aboutSSL VPNTechnology, which of the following statements is false?

A.
SSL VPNtechnology can be perfectly adapted toNATthrough the scene
A.
SSL VPNtechnology can be perfectly adapted toNATthrough the scene
Answers
B.
SSL VPNThe encryption of the technology only takes effect at the application layer
B.
SSL VPNThe encryption of the technology only takes effect at the application layer
Answers
C.
SSL VPNRequires a dial-up client
C.
SSL VPNRequires a dial-up client
Answers
D.
SSL VPNTechnology expands the reach of the enterprise's network
D.
SSL VPNTechnology expands the reach of the enterprise's network
Answers
Suggested answer: C

Which of the following options can bewindowsDo you do it in the advanced settings of the firewall?

(multiple choice)

A.
Restore defaults
A.
Restore defaults
Answers
B.
Change notification rules
B.
Change notification rules
Answers
C.
Set up connection security rules
C.
Set up connection security rules
Answers
D.
Set up inbound and outbound rules
D.
Set up inbound and outbound rules
Answers
Suggested answer: C, D
Total 497 questions
Go to page: of 50