ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 23

Question list
Search
Search

Related questions











Which of the following options isL2TPThe port number used by the packet?

A.
17
A.
17
Answers
B.
500
B.
500
Answers
C.
1701
C.
1701
Answers
D.
4500
D.
4500
Answers
Suggested answer: C

The steps of the security assessment method do not include which of the following?

A.
Manual audit
A.
Manual audit
Answers
B.
Penetration testing
B.
Penetration testing
Answers
C.
Questionnaire
C.
Questionnaire
Answers
D.
data analysis
D.
data analysis
Answers
Suggested answer: D

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following is true about firewall security policies?

A.
By default, the security policy can control unicast packets and broadcast packets
A.
By default, the security policy can control unicast packets and broadcast packets
Answers
B.
By default, the security policy can control multicast
B.
By default, the security policy can control multicast
Answers
C.
By default, the security policy only controls unicast packets.
C.
By default, the security policy only controls unicast packets.
Answers
D.
By default, the security policy can control unicast packets, broadcast packets, and multicast packets.
D.
By default, the security policy can control unicast packets, broadcast packets, and multicast packets.
Answers
Suggested answer: C

Which of the following information is encrypted during the use of digital envelopes? (multiple choice)

A.
Symmetric key
A.
Symmetric key
Answers
B.
User data
B.
User data
Answers
C.
Receiver's public key
C.
Receiver's public key
Answers
D.
Receiver's private key
D.
Receiver's private key
Answers
Suggested answer: A, B

Which of the following is an action to be taken during the eradication phase in a cybersecurity emergency response? (multiple choice)

A.
Find Trojan horses, illegal authorizations, and system loopholes, and deal with them in a timely manner
A.
Find Trojan horses, illegal authorizations, and system loopholes, and deal with them in a timely manner
Answers
B.
Revise security policies based on security incidents that occur, enable security auditing
B.
Revise security policies based on security incidents that occur, enable security auditing
Answers
C.
Block the behavior of the attack and reduce the impact
C.
Block the behavior of the attack and reduce the impact
Answers
D.
Confirm the degree of damage caused by the security incident and report the security incident
D.
Confirm the degree of damage caused by the security incident and report the security incident
Answers
Suggested answer: A, B

DHCP SnoopingWhich of the following attacks can be prevented? (multiple choice)

A.
DHCP ServerCounterfeiter Attack
A.
DHCP ServerCounterfeiter Attack
Answers
B.
middleman withIP/MAC spoofingattack
B.
middleman withIP/MAC spoofingattack
Answers
C.
IPspoofing attack
C.
IPspoofing attack
Answers
D.
useoption82Phishing of fieldsDHCPlease renewal attack
D.
useoption82Phishing of fieldsDHCPlease renewal attack
Answers
Suggested answer: A, B, C, D

at HuaweiSDSecIn the solution, which of the following options belong to the device of the executive layer? (multiple choice)

A.
CIS
A.
CIS
Answers
B.
Fierhunter
B.
Fierhunter
Answers
C.
router
C.
router
Answers
D.
AntiDDoS
D.
AntiDDoS
Answers
Suggested answer: B, C, D

A company's employee account has expired, but the account can still be used to access the company's server. Which security risks do the above scenarios belong to? (multiple choice)

A.
Manage security risks
A.
Manage security risks
Answers
B.
access security risk
B.
access security risk
Answers
C.
system security risk
C.
system security risk
Answers
D.
physical security risk
D.
physical security risk
Answers
Suggested answer: A, B, C

Which of the following is the default backup mode for dual-system hot standby?

A.
automatic backup
A.
automatic backup
Answers
B.
Manual batch backup
B.
Manual batch backup
Answers
C.
Session fast backup
C.
Session fast backup
Answers
D.
After the device restarts, the active and standbyFWConfiguration
D.
After the device restarts, the active and standbyFWConfiguration
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50