ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 22

Question list
Search
Search

Related questions











Which of the following attacks is not a special packet attack?

A.
ICMPredirected packet attack
A.
ICMPredirected packet attack
Answers
B.
ICMPUnreachable Packet Attack
B.
ICMPUnreachable Packet Attack
Answers
C.
IPaddress scanning attack
C.
IPaddress scanning attack
Answers
D.
oversizedICMPPacket attack
D.
oversizedICMPPacket attack
Answers
Suggested answer: C

Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)

A.
Vulnerability Scanning Device
A.
Vulnerability Scanning Device
Answers
B.
firewall
B.
firewall
Answers
C.
Anti-DDoSequipment
C.
Anti-DDoSequipment
Answers
D.
IPS/IDSequipment
D.
IPS/IDSequipment
Answers
Suggested answer: B, C, D

Which of the following is used in digital signature technology to encrypt digital fingerprints?

A.
sender's public key
A.
sender's public key
Answers
B.
sender private key
B.
sender private key
Answers
C.
Receiver's public key
C.
Receiver's public key
Answers
D.
Receiver's private key
D.
Receiver's private key
Answers
Suggested answer: B

OSPFCompareRIPThe more commonly used reason isOSPFWith device authentication function, it is more secure

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

The content of intrusion detection covers all kinds of authorized and unauthorized intrusion behaviors. Which of the following behaviors does not belong to the scope of intrusion detection?

A.
Impersonate another user
A.
Impersonate another user
Answers
B.
The administrator deletes the configuration by mistake
B.
The administrator deletes the configuration by mistake
Answers
C.
Planting worm Trojans
C.
Planting worm Trojans
Answers
D.
leak data
D.
leak data
Answers
Suggested answer: B

againstARPDescription of spoofing attack, which of the following is false

A.
ARPThe implementation mechanism only considers normal business interactions, and does not perform any verification on abnormal business interactions or malicious behaviors
A.
ARPThe implementation mechanism only considers normal business interactions, and does not perform any verification on abnormal business interactions or malicious behaviors
Answers
B.
ARPSpoofing attacks can only be done byARPReply to achieve, can not passARPrequest fulfillment
B.
ARPSpoofing attacks can only be done byARPReply to achieve, can not passARPrequest fulfillment
Answers
C.
When a host sends normalARPWhen the request is made, the attacker will preemptively answer, causing the host to establish an erroneousIPandMACMapping relations
C.
When a host sends normalARPWhen the request is made, the attacker will preemptively answer, causing the host to establish an erroneousIPandMACMapping relations
Answers
D.
ARPStatic binding is the solutionARPA scheme of spoofing attack, mainly used in scenarios with small network scale
D.
ARPStatic binding is the solutionARPA scheme of spoofing attack, mainly used in scenarios with small network scale
Answers
Suggested answer: B

MACWhich of the following mechanisms are used by flood attacks? (multiple choice)

A.
switchMAClearning mechanism
A.
switchMAClearning mechanism
Answers
B.
Switch Forwarding Mechanism
B.
Switch Forwarding Mechanism
Answers
C.
ARPlearning mechanism
C.
ARPlearning mechanism
Answers
D.
MACLimit on the number of entries
D.
MACLimit on the number of entries
Answers
Suggested answer: A, B, C, D

Firewall usagehrp standby config enableAfter the standby device configuration function is enabled by the command, all information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

In practical applications, asymmetric encryption is mainly used to encrypt user data

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

When an enterprise establishes its own information system, it checks each operation according to the authoritative standards formulated by the international, and can check whether its own information system is safe or not.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50