ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 35

Question list
Search
Search

Related questions











User authentication is the authentication of the client identity by the SSL virtual gateway, including:

______, server authentication, certificate anonymous authentication and certificate challenge authentication.[fill in the blank]

A.
local authentication
A.
local authentication
Answers
Suggested answer: A

When an information security incident occurs, give priority to using ______ emergency response to provide technical support to customers [fill in the blank]*

A.
MPDRR
A.
MPDRR
Answers
Suggested answer: A

Drag the steps of electronic forensics on the left into the box on the right to summarize, and arrange them from top to bottom in the order of execution.

A.
to track
A.
to track
Answers
Suggested answer: A

Regarding the description of risk assessment, which of the following is false? ( )[Multiple choice]

A.
Risk assessment requires training in asset collection and risk assessment methods
A.
Risk assessment requires training in asset collection and risk assessment methods
Answers
B.
Risk assessment entails identifying threats, vulnerabilities, and scanning for security vulnerabilities.
B.
Risk assessment entails identifying threats, vulnerabilities, and scanning for security vulnerabilities.
Answers
C.
Risk assessment requires assessing risks and classifying risk levels
C.
Risk assessment requires assessing risks and classifying risk levels
Answers
D.
Risk assessment requires monitoring system operation.
D.
Risk assessment requires monitoring system operation.
Answers
Suggested answer: D

The attacker searches the ports currently open by the attacked object by scanning the ports to determine the attack mode. In port scanning attacks, attackers usually use Port Scan attack software to initiate a series of TCP/UDP connections, and determine whether the host uses these ports to provide services according to the response packets. Such network probing is called _____ scanning.[fill in the blank]*

A.
port
A.
port
Answers
Suggested answer: A

Please correspond the following protocols to their TCP/IP protocol stack levels

A.
get evidence
A.
get evidence
Answers
Suggested answer: A

Please correctly categorize the main functions of the following operating systems.

A.
file management
A.
file management
Answers
Suggested answer: A

Please correctly categorize the following servers and their functions

A.
Prory Server
A.
Prory Server
Answers
Suggested answer: A

Which of the following is not a stand-alone anti-virus technology? ( )[Multiple choice]*

A.
Configure anti-virus technology on network firewall
A.
Configure anti-virus technology on network firewall
Answers
B.
Use virus detection tools
B.
Use virus detection tools
Answers
C.
Patch the system
C.
Patch the system
Answers
Suggested answer: A

Please match the following NAT technologies and the functions implemented one by one

A.
NAI Server
A.
NAI Server
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50