ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions











aboutPKIOrdering of work processes, which of the following is correct?

A.
1-2-6-5-7-4-3-8
A.
1-2-6-5-7-4-3-8
Answers
B.
1-2-7-6-5-4-3-8
B.
1-2-7-6-5-4-3-8
Answers
C.
6-5-4-1-2-7-3-8
C.
6-5-4-1-2-7-3-8
Answers
D.
6-5-4-3-1-2-7-8
D.
6-5-4-3-1-2-7-8
Answers
Suggested answer: B

firewallTrustClients in the domain can log inUntrustin the domainFTPserver, but the file cannot be downloaded, which of the following can solve the problem? (multiple choice)

A.
existTrustandUntrustrelease betweentwenty oneThe port number
A.
existTrustandUntrustrelease betweentwenty oneThe port number
Answers
B.
FTPWorks asportmode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
B.
FTPWorks asportmode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
Answers
C.
enabledetect ftp
C.
enabledetect ftp
Answers
D.
FTPWorks asPassivemode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
D.
FTPWorks asPassivemode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
Answers
Suggested answer: C, D

Which of the following is not part of a digital certificate?

A.
public key
A.
public key
Answers
B.
private key
B.
private key
Answers
C.
Validity period
C.
Validity period
Answers
D.
Issuer
D.
Issuer
Answers
Suggested answer: B

aboutTCP/IPDescription of protocol stack packet decapsulation, which of the following is correct?

(multiple choice)

A.
The data packet is first transmitted to the data link layer. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as:IP
A.
The data packet is first transmitted to the data link layer. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as:IP
Answers
B.
transport layer (TCP) after receiving the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such asUDP
B.
transport layer (TCP) after receiving the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such asUDP
Answers
C.
After the network layer receives the data packet, the network layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as HTTP
C.
After the network layer receives the data packet, the network layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as HTTP
Answers
D.
After the application layer receives the data packet, the application layer information is stripped after parsing, and the final displayed user data is exactly the same as the data sent by the sender host
D.
After the application layer receives the data packet, the application layer information is stripped after parsing, and the final displayed user data is exactly the same as the data sent by the sender host
Answers
Suggested answer: A, D

Which of the following is not a key technology of antivirus software?

A.
Shelling technology
A.
Shelling technology
Answers
B.
self protection
B.
self protection
Answers
C.
format the disk
C.
format the disk
Answers
D.
Update virus database in real time
D.
Update virus database in real time
Answers
Suggested answer: C

Which of the following options are malicious programs? (multiple choice)

A.
Trojan horse
A.
Trojan horse
Answers
B.
Vulnerability
B.
Vulnerability
Answers
C.
worm
C.
worm
Answers
D.
Virus
D.
Virus
Answers
Suggested answer: A, C, D

Which of the following options are key elements of information security precautions? (multiple choice)

A.
asset Management
A.
asset Management
Answers
B.
Security operation and management
B.
Security operation and management
Answers
C.
Security Products and Technologies
C.
Security Products and Technologies
Answers
D.
personnel
D.
personnel
Answers
Suggested answer: A, B, C, D

Which of the following is not a major form of computer crime?

A.
Implant the Trojan horse on the target host
A.
Implant the Trojan horse on the target host
Answers
B.
Hacking the target host
B.
Hacking the target host
Answers
C.
Personal questionnaires using a computer
C.
Personal questionnaires using a computer
Answers
D.
Using scanning tools to collect network information without permission
D.
Using scanning tools to collect network information without permission
Answers
Suggested answer: C

deployIPSec VPNIn tunnel mode, useAHprotocol for packet encapsulation. NewIPIn the header field of the packet, which of the following parameters does not need to be checked for data integrity?

A.
sourceIPaddress
A.
sourceIPaddress
Answers
B.
PurposeIPaddress
B.
PurposeIPaddress
Answers
C.
TTL
C.
TTL
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: C

in configurationGRE Tunnelinterface,DestinationThe address generally refers to which of the following parameters?

A.
localTunnelinterfaceIPaddress
A.
localTunnelinterfaceIPaddress
Answers
B.
Local external network egressIPaddress
B.
Local external network egressIPaddress
Answers
C.
External network egressIPaddress
C.
External network egressIPaddress
Answers
D.
PeerTunnelinterfaceIPaddress
D.
PeerTunnelinterfaceIPaddress
Answers
Suggested answer: C
Total 497 questions
Go to page: of 50