ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











_____ Authentication is to configure user information (including local user's user name, password and various attributes) on the network access server. The advantage is that it is fast.[fill in the blank]*

A.
local authentication
A.
local authentication
Answers
Suggested answer: A

Which of the following descriptions about the main implementation of single sign-on is wrong? ( )[Multiple choice]*

A.
Accept PC message mode
A.
Accept PC message mode
Answers
B.
Query the AD server security log mode
B.
Query the AD server security log mode
Answers
C.
Query the syslog server mode
C.
Query the syslog server mode
Answers
D.
Firewall monitors AD authentication packets
D.
Firewall monitors AD authentication packets
Answers
Suggested answer: C

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the ____ encryption algorithm to improve the encryption and decryption speed.[fill in the blank]*

A.
ymmetry
A.
ymmetry
Answers
Suggested answer: A

encapsulate IP packets using the AH+ESP protocol? ( )[Multiple choice]*

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: D

Please order the following steps in the PKI life cycle correctly, 1. Issued, 2. storage, 3. Update, 4. verify[fill in the blank]*

A.
1243
A.
1243
Answers
Suggested answer: A

Drag the phases of the cybersecurity emergency response on the left into the box on the right, and arrange them from top to bottom in the order of execution. 1. Inhibition stage, 2. recovery phase, 3.

Detection stage, 4. eradication phase[fill in the blank]*

A.
3142
A.
3142
Answers
Suggested answer: A

Match the following survey methods to the descriptions one by one

A.
crime investigation
A.
crime investigation
Answers
Suggested answer: A

____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*

A.
business continuity plan
A.
business continuity plan
Answers
Suggested answer: A

Social engineering is a means of harm such as deception, harm, etc. through psychological traps such as psychological weaknesses, instinctive reactions, curiosity, trust, and greed of victims ( )

A.
TURE
A.
TURE
Answers
B.
False
B.
False
Answers
Suggested answer: B

An engineer needs to back up the firewall configuration. Now he wants to use a command to view all the current configurations of the firewall. May I ask the command he uses is ____[fill in the blank]*

A.
display current-configuration
A.
display current-configuration
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50