ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

aboutwindowslog, which of the following descriptions is false?

System logs are used to record events generated by operating system components, mainly including crashes of drivers, system components and application software, and data
System logs are used to record events generated by operating system components, mainly including crashes of drivers, system components and application software, and data
windows server 2008The system logs are stored inApplication.evtxmiddle
windows server 2008The system logs are stored inApplication.evtxmiddle
The application log contains events recorded by applications or system programs, mainly recording program operation events
The application log contains events recorded by applications or system programs, mainly recording program operation events
windows server 2008The security log is stored insecurity.evtxmiddle
windows server 2008The security log is stored insecurity.evtxmiddle
Suggested answer: B
asked 18/09/2024
Blavier Arnaud
48 questions

Question 172

Report Export Collapse

againstIPspoofing attack (IP Spoofing), which of the following is an error?

IPSpoofing attacks are based onIPaddress trust relationship to initiate
IPSpoofing attacks are based onIPaddress trust relationship to initiate
IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information
IPAfter a successful spoofing attack, the attacker can use forged arbitraryIPThe address impersonates a legitimate host to access key information
The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection
The attacker needs to put the sourceIPlandaddress masquerading as a trusted host and sendSYNmarkNote the data segment request connection
based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.
based onIPThe hosts in the trust relationship of the addresses can log in directly without entering password authentication.
Suggested answer: C
asked 18/09/2024
Vicky Mukhy
37 questions

Question 173

Report Export Collapse

existUSGIn the series firewalls, which of the following commands can be used to queryNATconversion result?

display nat translation
display nat translation
display firewall session table
display firewall session table
display current nat
display current nat
display firewall nat translation
display firewall nat translation
Suggested answer: B
asked 18/09/2024
vinoth inigo
46 questions

Question 174

Report Export Collapse

The preservation of electronic evidence is directly related to the legal validity of the evidence, and the authenticity and reliability of the preservation in compliance with legal procedures can be guaranteed. Which of the following is not an evidence preservation technique?

Encryption Technology
Encryption Technology
digital certificate technology
digital certificate technology
digital signature technology
digital signature technology
Packet Tag Tracking Technology
Packet Tag Tracking Technology
Suggested answer: D
asked 18/09/2024
Prinesh Chain
47 questions

Question 175

Report Export Collapse

Which of the following areHRP(Huawei Redundancy Protocol) protocol can back up state information? (multiple choice)

session table
session table
ServerMapentry
ServerMapentry
Dynamic blacklist
Dynamic blacklist
routing table
routing table
Suggested answer: A, B, C
asked 18/09/2024
Matthew Walsh
33 questions

Question 176

Report Export Collapse

As shown in the figure, the clientAand serverBestablished betweenTCPconnection, two places in the figure"?"The message sequence number should be which of the following?

Huawei H12-711 image Question 176 32611 09182024192717000000

a+1:a
a+1:a
a:a+1
a:a+1
b+1:b
b+1:b
a+1:a+1
a+1:a+1
Suggested answer: D
asked 18/09/2024
MichaΓ…‚ Wojciechowski
34 questions

Question 177

Report Export Collapse

Digital certificates can be divided into local certificates,CACertificates, root certificates, self-signed certificates, etc.

True
True
False
False
Suggested answer: A
asked 18/09/2024
TANVIR ANJUM
39 questions

Question 178

Report Export Collapse

Which of the following is an encryption technique used in digital envelopes?

Symmetric encryption algorithm
Symmetric encryption algorithm
Asymmetric encryption algorithm
Asymmetric encryption algorithm
hash algorithm
hash algorithm
Stream Encryption Algorithm
Stream Encryption Algorithm
Suggested answer: B
asked 18/09/2024
Justin NJOCK
51 questions

Question 179

Report Export Collapse

Which of the following are remote authentication methods? (multiple choice)

RADIUS
RADIUS
Local
Local
HWTACACS
HWTACACS
LLDP
LLDP
Suggested answer: A, C
asked 18/09/2024
RYAN UBANA
46 questions

Question 180

Report Export Collapse

aboutIPSec SA, which of the following statements is correct?

IPSec SAis unidirectional
IPSec SAis unidirectional
IPSec SAis bidirectional
IPSec SAis bidirectional
Used to generate encryption keys
Used to generate encryption keys
Used to generate secret algorithms
Used to generate secret algorithms
Suggested answer: A
asked 18/09/2024
Albert Terrell
40 questions
Total 497 questions
Go to page: of 50