ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

A.
symmetry
A.
symmetry
Answers
Suggested answer: A

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*

A.
ESP Header
A.
ESP Header
Answers
B.
TCP Header
B.
TCP Header
Answers
C.
Raw IP Header
C.
Raw IP Header
Answers
D.
ESP Tail
D.
ESP Tail
Answers
Suggested answer: A

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

A.
electronic
A.
electronic
Answers
Suggested answer: A

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

A.
3142
A.
3142
Answers
Suggested answer: A

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

A.
3124
A.
3124
Answers
Suggested answer: A

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

A.
Participate in information security training
A.
Participate in information security training
Answers
B.
Backup or restore data
B.
Backup or restore data
Answers
C.
Develop an emergency response plan
C.
Develop an emergency response plan
Answers
D.
Security hardening of the host
D.
Security hardening of the host
Answers
Suggested answer: A, B, C, D

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

A.
IGMP
A.
IGMP
Answers
B.
ICMP
B.
ICMP
Answers
C.
RIP
C.
RIP
Answers
D.
ARP
D.
ARP
Answers
Suggested answer: C

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*

A.
ifconfig)
A.
ifconfig)
Answers
B.
display ip interface brief
B.
display ip interface brief
Answers
C.
ipconfig
C.
ipconfig
Answers
D.
display ip
D.
display ip
Answers
Suggested answer: A

The trigger authentication method for firewall access user authentication does not include which of the following? ( )[Multiple choice]*

A.
MPLS VPN
A.
MPLS VPN
Answers
B.
SSL VPN
B.
SSL VPN
Answers
C.
IPSec VPN
C.
IPSec VPN
Answers
D.
L2TP VPN
D.
L2TP VPN
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50