ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

aboutPKIOrdering of work processes, which of the following is correct?

1-2-6-5-7-4-3-8
1-2-6-5-7-4-3-8
1-2-7-6-5-4-3-8
1-2-7-6-5-4-3-8
6-5-4-1-2-7-3-8
6-5-4-1-2-7-3-8
6-5-4-3-1-2-7-8
6-5-4-3-1-2-7-8
Suggested answer: B
asked 18/09/2024
Paul Shortt
44 questions

Question 92

Report Export Collapse

firewallTrustClients in the domain can log inUntrustin the domainFTPserver, but the file cannot be downloaded, which of the following can solve the problem? (multiple choice)

existTrustandUntrustrelease betweentwenty oneThe port number
existTrustandUntrustrelease betweentwenty oneThe port number
FTPWorks asportmode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
FTPWorks asportmode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
enabledetect ftp
enabledetect ftp
FTPWorks asPassivemode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
FTPWorks asPassivemode, modify fromTrustarriveUntrustThe zone's security policy action is Allow
Suggested answer: C, D
asked 18/09/2024
Ryan Shannon
44 questions

Question 93

Report Export Collapse

Which of the following is not part of a digital certificate?

public key
public key
private key
private key
Validity period
Validity period
Issuer
Issuer
Suggested answer: B
asked 18/09/2024
MOHAMED BEN SLIMEN
37 questions

Question 94

Report Export Collapse

aboutTCP/IPDescription of protocol stack packet decapsulation, which of the following is correct?

(multiple choice)

The data packet is first transmitted to the data link layer. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as:IP
The data packet is first transmitted to the data link layer. After parsing, the data link layer information is stripped, and the network layer information is known according to the parsing information, such as:IP
transport layer (TCP) after receiving the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such asUDP
transport layer (TCP) after receiving the data packet, the transport layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such asUDP
After the network layer receives the data packet, the network layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as HTTP
After the network layer receives the data packet, the network layer information is stripped after parsing, and the upper layer processing protocol is known according to the parsing information, such as HTTP
After the application layer receives the data packet, the application layer information is stripped after parsing, and the final displayed user data is exactly the same as the data sent by the sender host
After the application layer receives the data packet, the application layer information is stripped after parsing, and the final displayed user data is exactly the same as the data sent by the sender host
Suggested answer: A, D
asked 18/09/2024
Hemanth Gangabattula
40 questions

Question 95

Report Export Collapse

Which of the following is not a key technology of antivirus software?

Shelling technology
Shelling technology
self protection
self protection
format the disk
format the disk
Update virus database in real time
Update virus database in real time
Suggested answer: C
asked 18/09/2024
Heng Tan
39 questions

Question 96

Report Export Collapse

Which of the following options are malicious programs? (multiple choice)

Trojan horse
Trojan horse
Vulnerability
Vulnerability
worm
worm
Virus
Virus
Suggested answer: A, C, D
asked 18/09/2024
Ken Wilson
48 questions

Question 97

Report Export Collapse

Which of the following options are key elements of information security precautions? (multiple choice)

asset Management
asset Management
Security operation and management
Security operation and management
Security Products and Technologies
Security Products and Technologies
personnel
personnel
Suggested answer: A, B, C, D
asked 18/09/2024
Marc Codó
48 questions

Question 98

Report Export Collapse

Which of the following is not a major form of computer crime?

Implant the Trojan horse on the target host
Implant the Trojan horse on the target host
Hacking the target host
Hacking the target host
Personal questionnaires using a computer
Personal questionnaires using a computer
Using scanning tools to collect network information without permission
Using scanning tools to collect network information without permission
Suggested answer: C
asked 18/09/2024
Lee, Eduardo
56 questions

Question 99

Report Export Collapse

deployIPSec VPNIn tunnel mode, useAHprotocol for packet encapsulation. NewIPIn the header field of the packet, which of the following parameters does not need to be checked for data integrity?

sourceIPaddress
sourceIPaddress
PurposeIPaddress
PurposeIPaddress
TTL
TTL
Identification
Identification
Suggested answer: C
asked 18/09/2024
Tomas Ojeda
45 questions

Question 100

Report Export Collapse

in configurationGRE Tunnelinterface,DestinationThe address generally refers to which of the following parameters?

localTunnelinterfaceIPaddress
localTunnelinterfaceIPaddress
Local external network egressIPaddress
Local external network egressIPaddress
External network egressIPaddress
External network egressIPaddress
PeerTunnelinterfaceIPaddress
PeerTunnelinterfaceIPaddress
Suggested answer: C
asked 18/09/2024
Rostyslav Skrypnyk
55 questions
Total 497 questions
Go to page: of 50