ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 17

Question list
Search
Search

Related questions











After a cyber-attack event occurs, set up an isolation area, summarize data, and estimate losses according to the plan. Which of the above actions belong to the work content of the cyber security emergency response?

A.
preparation stage
A.
preparation stage
Answers
B.
detection stage
B.
detection stage
Answers
C.
Inhibition stage
C.
Inhibition stage
Answers
D.
recovery phase
D.
recovery phase
Answers
Suggested answer: C

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

The digital certificate fairs the public key through a third-party organization, thereby ensuring the non-repudiation of data transmission. Therefore, to confirm the correctness of the public key, only the certificate of the communicating party is required.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Digital signature is to generate digital fingerprint by using hash algorithm, so as to ensure the integrity of data transmission

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

About firewall fragmentationWhich of the following options is correct? (multiple choice)

A.
By default, the firewall caches fragmented packets
A.
By default, the firewall caches fragmented packets
Answers
B.
After the direct forwarding of fragmented packets is configured, the firewall will forward the fragmented packets that are not the first fragmented packets according to the interzone security policy.
B.
After the direct forwarding of fragmented packets is configured, the firewall will forward the fragmented packets that are not the first fragmented packets according to the interzone security policy.
Answers
C.
For fragmented packets,NATALGnot supportedSIPFragmented Packet Processing
C.
For fragmented packets,NATALGnot supportedSIPFragmented Packet Processing
Answers
D.
By default, aIPV4The maximum number of fragment buffers for packets is32,OneIPV6The maximum number of fragment buffers for packets is255
D.
By default, aIPV4The maximum number of fragment buffers for packets is32,OneIPV6The maximum number of fragment buffers for packets is255
Answers
Suggested answer: A, C, D

SIPprotocol usageSDPmessage to establish a session,SDPThe message contains a remote address or a multicast address

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following attacks is not a cyber attack?

A.
IPspoofing attack
A.
IPspoofing attack
Answers
B.
Smurfattack
B.
Smurfattack
Answers
C.
MACaddress spoofing attack
C.
MACaddress spoofing attack
Answers
D.
ICMPattack
D.
ICMPattack
Answers
Suggested answer: C

SNMPWhat versions of the protocol are there? (multiple choice)

A.
SNMPv1
A.
SNMPv1
Answers
B.
SNMPv2b
B.
SNMPv2b
Answers
C.
SNMPv2c
C.
SNMPv2c
Answers
D.
SNMPv3
D.
SNMPv3
Answers
Suggested answer: A, C, D

aboutVGMPDescription of the managed preemption function, which of the following is false?

A.
By default,VGMPThe preemption function of the management group is enabled
A.
By default,VGMPThe preemption function of the management group is enabled
Answers
B.
By default,VGMPThe preemption delay time of the management group is40s
B.
By default,VGMPThe preemption delay time of the management group is40s
Answers
C.
Preemption means that when the original faulty master device recovers, its priority will be restored. At this time, it can preempt its own state as the master device again.
C.
Preemption means that when the original faulty master device recovers, its priority will be restored. At this time, it can preempt its own state as the master device again.
Answers
D.
whenVRRPBackup group added toVGMPAfter managing the group,VRRPThe original preemption function on the backup group fails
D.
whenVRRPBackup group added toVGMPAfter managing the group,VRRPThe original preemption function on the backup group fails
Answers
Suggested answer: B

existIPSec VPNIn the transmission mode, which part of the encrypted data packet is?

A.
Network layer and upper layer data packets
A.
Network layer and upper layer data packets
Answers
B.
OriginalIPheader
B.
OriginalIPheader
Answers
C.
newIPheader
C.
newIPheader
Answers
D.
Transport layer and upper layer data packets
D.
Transport layer and upper layer data packets
Answers
Suggested answer: D
Total 497 questions
Go to page: of 50