ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 30

Question list
Search
Search

Related questions











In order to obtain criminal evidence, it is necessary to master the technology of intrusion tracking.

Which of the following options are correct for the description of tracking technology? (multiple choice)

A.
Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router they pass through
A.
Packet logging technology through the tracedIPInsert trace data into packets to mark packets on each router they pass through
Answers
B.
Link testing technology determines the information of the attack source by testing the network link between routers
B.
Link testing technology determines the information of the attack source by testing the network link between routers
Answers
C.
Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques
C.
Packet marking technology extracts attack source information by logging packets on routers and then using data drilling techniques
Answers
D.
Shallow mail behavior analysis can achieveIPAnalysis of addresses, sent time, sending frequency, number of recipients, shallow email headers, and more.
D.
Shallow mail behavior analysis can achieveIPAnalysis of addresses, sent time, sending frequency, number of recipients, shallow email headers, and more.
Answers
Suggested answer: A, B, D

Digital signature technology obtains a digital signature by encrypting which of the following data?

A.
User data
A.
User data
Answers
B.
Receiver's public key
B.
Receiver's public key
Answers
C.
sender's public key
C.
sender's public key
Answers
D.
digital fingerprint
D.
digital fingerprint
Answers
Suggested answer: D

at HuaweiUSGOn the series firewalls, the default security policy does not support modification.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

In the classification of the information security level protection system, which of the following levels define that if the information system is destroyed, it will cause damage to social order and public interests? (multiple choice)

A.
first levelUser self-protection level
A.
first levelUser self-protection level
Answers
B.
second levelSystem Audit Protection Level
B.
second levelSystem Audit Protection Level
Answers
C.
third levelSafety Mark Protection
C.
third levelSafety Mark Protection
Answers
D.
fourth level structured protection
D.
fourth level structured protection
Answers
Suggested answer: A, B, C, D

at HuaweiSDSecIn the solution, which of the following is an analysis layer device?

A.
CIS
A.
CIS
Answers
B.
Agile Controller
B.
Agile Controller
Answers
C.
switch
C.
switch
Answers
D.
Firehunter
D.
Firehunter
Answers
Suggested answer: D

Control actions of firewall inter-domain forwarding security policypermitanddeny, which of the following options are correct? (multiple choice)

A.
The actions of the firewall's default security policy are:deny
A.
The actions of the firewall's default security policy are:deny
Answers
B.
The packet matches the interzone security policydenyThe packet is discarded immediately after the action, and other interzone security policies will not continue to be executed.
B.
The packet matches the interzone security policydenyThe packet is discarded immediately after the action, and other interzone security policies will not continue to be executed.
Answers
C.
Even if the packet matches the security policypermitaction, and may not necessarily be forwarded by the firewall
C.
Even if the packet matches the security policypermitaction, and may not necessarily be forwarded by the firewall
Answers
D.
Whether the packet matches the security policypermitaction, ordenyaction, will go toUTMmodule handling
D.
Whether the packet matches the security policypermitaction, ordenyaction, will go toUTMmodule handling
Answers
Suggested answer: A, B, C

Business Impact Analysis (BIA) does not include which of the following?

A.
business priority
A.
business priority
Answers
B.
Incident handling priority
B.
Incident handling priority
Answers
C.
impact assessment
C.
impact assessment
Answers
D.
Risk Identification
D.
Risk Identification
Answers
Suggested answer: C

in deploymentIPSec VPN, which of the following is the main application scenario of tunnel mode?

A.
between host and host
A.
between host and host
Answers
B.
Between the host and the security gateway
B.
Between the host and the security gateway
Answers
C.
between security gateways
C.
between security gateways
Answers
D.
between host and server
D.
between host and server
Answers
Suggested answer: C

HRP(Huawei Redundancy Protocol) protocol, which is used to synchronize data such as key configuration and connection status of the firewall to the standby firewall, which of the following options does not belong to the scope of synchronization?

A.
security strategy
A.
security strategy
Answers
B.
NATStrategy
B.
NATStrategy
Answers
C.
blacklist
C.
blacklist
Answers
D.
IPSSignature set
D.
IPSSignature set
Answers
Suggested answer: D

Which of the following statements is true about business continuity plans? (multiple choice)

A.
The business continuity plan does not require senior company involvement during the scoping phase of the project
A.
The business continuity plan does not require senior company involvement during the scoping phase of the project
Answers
B.
I thought it was impossible to predict all possible accidents, soBCPFlexibility is required
B.
I thought it was impossible to predict all possible accidents, soBCPFlexibility is required
Answers
C.
The business continuity plan does not require senior company involvement until it is formally documented
C.
The business continuity plan does not require senior company involvement until it is formally documented
Answers
D.
Not all security incidents must be reported to company executives
D.
Not all security incidents must be reported to company executives
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50