ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 18

Question list
Search
Search

Related questions











aboutwindowslog, which of the following descriptions is false?

A.
System logs are used to record events generated by operating system components, mainly including crashes of drivers, system components and application software, and data
A.
System logs are used to record events generated by operating system components, mainly including crashes of drivers, system components and application software, and data
Answers
B.
windows server 2008The system logs are stored inApplication.evtxmiddle
B.
windows server 2008The system logs are stored inApplication.evtxmiddle
Answers
C.
The application log contains events recorded by applications or system programs, mainly recording program operation events
C.
The application log contains events recorded by applications or system programs, mainly recording program operation events
Answers
D.
windows server 2008The security log is stored insecurity.evtxmiddle
D.
windows server 2008The security log is stored insecurity.evtxmiddle
Answers
Suggested answer: B

againstIPspoofing attack (IP Spoofing), which of the following is an error?

A.
IPSpoofing attacks are based onIPaddress trust relationship to initiate
A.
IPSpoofing attacks are based onIPaddress trust relationship to initiate
Answers
B.
IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information
B.
IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information
Answers
C.
The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection
C.
The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection
Answers
D.
based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.
D.
based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.
Answers
Suggested answer: C

existUSGIn the series firewalls, which of the following commands can be used to queryNATconversion result?

A.
display nat translation
A.
display nat translation
Answers
B.
display firewall session table
B.
display firewall session table
Answers
C.
display current nat
C.
display current nat
Answers
D.
display firewall nat translation
D.
display firewall nat translation
Answers
Suggested answer: B

The preservation of electronic evidence is directly related to the legal validity of the evidence, and the authenticity and reliability of the preservation in compliance with legal procedures can be guaranteed. Which of the following is not an evidence preservation technique?

A.
Encryption Technology
A.
Encryption Technology
Answers
B.
digital certificate technology
B.
digital certificate technology
Answers
C.
digital signature technology
C.
digital signature technology
Answers
D.
Packet Tag Tracking Technology
D.
Packet Tag Tracking Technology
Answers
Suggested answer: D

Which of the following areHRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)

A.
session table
A.
session table
Answers
B.
ServerMapentry
B.
ServerMapentry
Answers
C.
Dynamic blacklist
C.
Dynamic blacklist
Answers
D.
routing table
D.
routing table
Answers
Suggested answer: A, B, C

As shown in the figure, the clientAand serverBestablished betweenTCPconnection, two places in the figure"?"The message sequence number should be which of the following?

A.
a+1:a
A.
a+1:a
Answers
B.
a:a+1
B.
a:a+1
Answers
C.
b+1:b
C.
b+1:b
Answers
D.
a+1:a+1
D.
a+1:a+1
Answers
Suggested answer: D

Digital certificates can be divided into local certificates,CACertificates, root certificates, self-signed certificates, etc.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following is an encryption technique used in digital envelopes?

A.
Symmetric encryption algorithm
A.
Symmetric encryption algorithm
Answers
B.
Asymmetric encryption algorithm
B.
Asymmetric encryption algorithm
Answers
C.
hash algorithm
C.
hash algorithm
Answers
D.
Stream Encryption Algorithm
D.
Stream Encryption Algorithm
Answers
Suggested answer: B

Which of the following are remote authentication methods? (multiple choice)

A.
RADIUS
A.
RADIUS
Answers
B.
Local
B.
Local
Answers
C.
HWTACACS
C.
HWTACACS
Answers
D.
LLDP
D.
LLDP
Answers
Suggested answer: A, C

aboutIPSec SA, which of the following statements is correct?

A.
IPSec SAis unidirectional
A.
IPSec SAis unidirectional
Answers
B.
IPSec SAis bidirectional
B.
IPSec SAis bidirectional
Answers
C.
Used to generate encryption keys
C.
Used to generate encryption keys
Answers
D.
Used to generate secret algorithms
D.
Used to generate secret algorithms
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50