Huawei H12-711 Practice Test - Questions Answers, Page 22
List of questions
Question 211
Which of the following attacks is not a special packet attack?
Question 212
Security technology has different methods in different technical levels and fields. Which of the following devices can be used for network layer security? (multiple choice)
Question 213
Which of the following is used in digital signature technology to encrypt digital fingerprints?
Question 214
OSPFCompareRIPThe more commonly used reason isOSPFWith device authentication function, it is more secure
Question 215
The content of intrusion detection covers all kinds of authorized and unauthorized intrusion behaviors. Which of the following behaviors does not belong to the scope of intrusion detection?
Question 216
againstARPDescription of spoofing attack, which of the following is false
Question 217
MACWhich of the following mechanisms are used by flood attacks? (multiple choice)
Question 218
Firewall usagehrp standby config enableAfter the standby device configuration function is enabled by the command, all information that can be backed up can be configured directly on the standby device, and the configuration on the standby device can be synchronized to the active device.
Question 219
In practical applications, asymmetric encryption is mainly used to encrypt user data
Question 220
When an enterprise establishes its own information system, it checks each operation according to the authoritative standards formulated by the international, and can check whether its own information system is safe or not.
Question