Huawei H12-711 Practice Test - Questions Answers, Page 37

List of questions
Question 361

IPSec VPN uses an asymmetric algorithm to calculate the ___ key to encrypt data packets.[fill in the blank]
Question 362

When IPSec VPN uses tunnel mode to encapsulate packets, which of the following is not within the encryption scope of the ESP security protocol? ( )[Multiple choice]*
Question 363

Database operation records can be used as ___ evidence to backtrack security events.[fill in the blank]*
Question 364

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution.[fill in the blank]*
Question 365

Drag the warning level of the network security emergency response on the left into the box on the right, and arrange it from top to bottom in order of severity.[fill in the blank]*
Question 366

According to the level protection requirements, which of the following behaviors belong to the scope of information security operation and maintenance management? ( )*
Question 367

In the TCP/P protocol core, which of the following protocols works at the application layer? ( )[Multiple choice]*
Question 368

When using passive mode to establish an FTP connection, the control channel uses port 20 and the data channel uses port 21. ( )[Multiple choice]*
Question 369

In the Linux system, which of the following is the command to query the P address information? ( )[Multiple choice]*
Question 370

The trigger authentication method for firewall access user authentication does not include which of the following? ( )[Multiple choice]*
Question