Huawei H12-711 Practice Test - Questions Answers, Page 37
List of questions
Question 361
IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]
Question 362
When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*
Question 363
Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*
Question 364
Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*
Question 365
Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*
Question 366
According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
Question 367
In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*
Question 368
When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*
Question 369
In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*
Question 370
The trigger authentication method for firewall access user authentication does not include which of the following? ( )[Multiple choice]*
Question