ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*

Huawei H12-711 image Question 364 32799 09182024192718000000

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*

Huawei H12-711 image Question 365 32800 09182024192718000000

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

The trigger authentication method for firewall access user authentication does not include which of the following? ( )[Multiple choice]*

Become a Premium Member for full access
  Unlock Premium Member
Total 497 questions
Go to page: of 50
Search