ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 27

Question list
Search
Search

Related questions











whenUSGWhich of the following logs can be viewed when the series firewall hard disk is in place?

(multiple choice)

A.
Operation log
A.
Operation log
Answers
B.
business log
B.
business log
Answers
C.
Alarm information
C.
Alarm information
Answers
D.
Threat log
D.
Threat log
Answers
Suggested answer: A, B, C, D

Social engineering is a means of harm such as deception, harm, etc., through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Applying for special funds for emergency response and purchasing emergency response software and hardware equipment belong to the work content of which stage of the network's complete emergency response?

A.
preparation stage
A.
preparation stage
Answers
B.
Inhibition stage
B.
Inhibition stage
Answers
C.
response phase
C.
response phase
Answers
D.
recovery phase
D.
recovery phase
Answers
Suggested answer: A

Equipment sabotage attacks are generally not easy to cause information leakage, but usually cause interruption of network communication services.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

about Internet users andVPNIn the description of access user authentication, which of the following is false?

A.
Internet users andVPNAccess to user shared data, user attribute check (user status, account expiration time, etc.) VPNAccess takes effect
A.
Internet users andVPNAccess to user shared data, user attribute check (user status, account expiration time, etc.) VPNAccess takes effect
Answers
B.
The process of online users using local authentication or server authentication is basically the same. Both users are authenticated through the authentication domain, and the user triggering method is also the same.
B.
The process of online users using local authentication or server authentication is basically the same. Both users are authenticated through the authentication domain, and the user triggering method is also the same.
Answers
C.
VPNAfter users access the network, they can access the network resources of the enterprise headquarters, and the firewall can control the network resources that can be accessed based on the user name
C.
VPNAfter users access the network, they can access the network resources of the enterprise headquarters, and the firewall can control the network resources that can be accessed based on the user name
Answers
D.
VPNAfter the access user is authenticated, it will go online in the user online list at the same time
D.
VPNAfter the access user is authenticated, it will go online in the user online list at the same time
Answers
Suggested answer: D

Which of the following statements about the patch is incorrect?

A.
A patch is a small program made by the original author of the software for a discovered vulnerability
A.
A patch is a small program made by the original author of the software for a discovered vulnerability
Answers
B.
Not patching does not affect the operation of the system, so whether patching is irrelevant or not.
B.
Not patching does not affect the operation of the system, so whether patching is irrelevant or not.
Answers
C.
Patches are generally updated continuously.
C.
Patches are generally updated continuously.
Answers
D.
Computer users should download and install the latest patches in a timely manner to protect their systems
D.
Computer users should download and install the latest patches in a timely manner to protect their systems
Answers
Suggested answer: B

About intrusion prevention systems (IPS), which of the following is false?

A.
IDSThe device needs to be linked with the firewall to block intrusion
A.
IDSThe device needs to be linked with the firewall to block intrusion
Answers
B.
IPSThe device cannot be deployed in bypass mode in the network
B.
IPSThe device cannot be deployed in bypass mode in the network
Answers
C.
IPSDevices can be connected in series at the network boundary and deployed online
C.
IPSDevices can be connected in series at the network boundary and deployed online
Answers
D.
IPSOnce the device detects intrusion behavior, it can achieve real-time blocking
D.
IPSOnce the device detects intrusion behavior, it can achieve real-time blocking
Answers
Suggested answer: B

Which of the following statements is true about Huawei's routers and switchers??(multiple choice)

A.
Routers can implement some security functions, and some routers can implement more security functions by adding security boards
A.
Routers can implement some security functions, and some routers can implement more security functions by adding security boards
Answers
B.
The main function of the router is to forward data. When the enterprise has security requirements, sometimes a firewall may be a more suitable choice
B.
The main function of the router is to forward data. When the enterprise has security requirements, sometimes a firewall may be a more suitable choice
Answers
C.
Switches have some security functions, and some switches can realize more security functions by adding security boards
C.
Switches have some security functions, and some switches can realize more security functions by adding security boards
Answers
D.
The switch does not have security features
D.
The switch does not have security features
Answers
Suggested answer: A, B, C

Which of the following options is NOTwindowsOS log type?

A.
business log
A.
business log
Answers
B.
application log
B.
application log
Answers
C.
Security log
C.
Security log
Answers
D.
System log
D.
System log
Answers
Suggested answer: A

After a network intrusion event occurs, the identity of the intrusion, the source of the attack and other information are obtained according to the plan, and the intrusion behavior is blocked. The above actions belong to PDRR. What are the links in the network security model? (multiple choice)

A.
Protection link
A.
Protection link
Answers
B.
Detection link
B.
Detection link
Answers
C.
response link
C.
response link
Answers
D.
recovery link
D.
recovery link
Answers
Suggested answer: B, C
Total 497 questions
Go to page: of 50