ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Related questions











Digital certificate technology solves the problem that the public key owner cannot be determined in digital signature technology

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following options are technical characteristics of an intrusion prevention system?

(multiple choice)

A.
online mode
A.
online mode
Answers
B.
real-time blocking
B.
real-time blocking
Answers
C.
Self-learning and adaptive
C.
Self-learning and adaptive
Answers
D.
In-line deployment
D.
In-line deployment
Answers
Suggested answer: A, B, C

Regarding the firewall security policy, the following items are correct?

A.
By default, the security policy can control unicast packets and broadcast packets.
A.
By default, the security policy can control unicast packets and broadcast packets.
Answers
B.
By default, the security policy can control multicast
B.
By default, the security policy can control multicast
Answers
C.
By default, the security policy only controls unicast packets..
C.
By default, the security policy only controls unicast packets..
Answers
D.
By default, the security policy can control unicast packets, broadcast packets, and multicast packets.
D.
By default, the security policy can control unicast packets, broadcast packets, and multicast packets.
Answers
Suggested answer: C

Which of the following information is encrypted during the use of digital envelopes? (multiple choice)

A.
Symmetric key
A.
Symmetric key
Answers
B.
User data
B.
User data
Answers
C.
Receiver's public key
C.
Receiver's public key
Answers
D.
Receiver's private key
D.
Receiver's private key
Answers
Suggested answer: A, B

Which of the following options areISO27001the field of certification? (multiple choice)

A.
Access control
A.
Access control
Answers
B.
personnel safety
B.
personnel safety
Answers
C.
Vulnerability Management
C.
Vulnerability Management
Answers
D.
business continuity management
D.
business continuity management
Answers
Suggested answer: A, B, C, D

Which of the following statements about firewalls is correct?

A.
The firewall cannot transparently access the network.
A.
The firewall cannot transparently access the network.
Answers
B.
Adding a firewall to the network will inevitably change the topology of the network.
B.
Adding a firewall to the network will inevitably change the topology of the network.
Answers
C.
To avoid a single point of failure, the firewall only supports bypass deployment
C.
To avoid a single point of failure, the firewall only supports bypass deployment
Answers
D.
Depending on the usage scenario, the firewall can be deployed in a transparent mode or a threebedroom type.
D.
Depending on the usage scenario, the firewall can be deployed in a transparent mode or a threebedroom type.
Answers
Suggested answer: D

at HuaweiUSGOn a series device, the administrator wants to wipe the configuration file, which of the following commands is correct?

A.
clear saved-configuration
A.
clear saved-configuration
Answers
B.
reset saved-configuration
B.
reset saved-configuration
Answers
C.
reset current-configuration
C.
reset current-configuration
Answers
D.
reset running-configuration
D.
reset running-configuration
Answers
Suggested answer: B

Which of the following options is correct for the description of a buffer overflow attack?(multiple choice)

A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges.
A.
Buffer overflow attacks exploit the flaws of software systems in memory operations to run attack code with high operating privileges.
Answers
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system.
B.
Buffer overflow attacks have nothing to do with the vulnerabilities and architecture of the operating system.
Answers
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
C.
Buffer overflow attacks are one of the most common ways to attack the behavior of software systems
Answers
D.
Buffer overflow attacks are application-layer attacks.
D.
Buffer overflow attacks are application-layer attacks.
Answers
Suggested answer: A, C, D

Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)

A.
Vulnerability Scanning Device
A.
Vulnerability Scanning Device
Answers
B.
firewall
B.
firewall
Answers
C.
Anti-DDoSequipment
C.
Anti-DDoSequipment
Answers
D.
IPS/IDSequipment
D.
IPS/IDSequipment
Answers
Suggested answer: B, C, D

IPSEC VPNtechnology adoptionESPSecurity protocol encapsulation is not supportedNATcross becauseESPThe header of the message is encrypted

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50