ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which of the following options arePKIComponents of the architecture? (multiple choice)

end entity
end entity
Certificate Authority
Certificate Authority
Certificate Registration Authority
Certificate Registration Authority
certificate store
certificate store
Suggested answer: A, B, C, D
asked 18/09/2024
Charles Manser
52 questions

Question 32

Report Export Collapse

"observant"and"remain skeptical"Can help us better identify security threats in the online world

True
True
False
False
Suggested answer: A
asked 18/09/2024
Luis Alfonso Rodriguez Castro
39 questions

Question 33

Report Export Collapse

In tunnel encapsulation mode.IPSecThere is no need to have a route to the destination private network segment during configuration, because the data will be re-encapsulated to use the newIPThe header looks up the routing table.

True
True
False
False
Suggested answer: B
asked 18/09/2024
michael hunter
40 questions

Question 34

Report Export Collapse

aboutwindowsFirewall description, which of the following options are correct? (multiple choice)

windowsThe firewall can only allow or prohibit preset programs or functions and programs installed on the system, and cannot customize the release rules according to the protocol or port number.
windowsThe firewall can only allow or prohibit preset programs or functions and programs installed on the system, and cannot customize the release rules according to the protocol or port number.
windowsThe firewall can not only allow or prohibit preset programs or functions and programs installed on the system, but also support its own custom release rules based on protocols or port numbers.
windowsThe firewall can not only allow or prohibit preset programs or functions and programs installed on the system, but also support its own custom release rules based on protocols or port numbers.
If you are settingwindowsDuring the firewall process, the Internet cannot be accessed. You can use the restore default function to quickly restore the firewall to its initial state.
If you are settingwindowsDuring the firewall process, the Internet cannot be accessed. You can use the restore default function to quickly restore the firewall to its initial state.
windows the firewall can also change the notification rules in a closed state
windows the firewall can also change the notification rules in a closed state
Suggested answer: B, C
asked 18/09/2024
samuel crook
49 questions

Question 35

Report Export Collapse

Which of the following statements about investigation and evidence collection is correct?

Evidence is not necessarily required during the investigation
Evidence is not necessarily required during the investigation
Evidence obtained by wiretapping is also valid
Evidence obtained by wiretapping is also valid
Ideally, law enforcement agencies should be involved in all investigative and evidence-gathering processes
Ideally, law enforcement agencies should be involved in all investigative and evidence-gathering processes
Documentary evidence is required in computer crime
Documentary evidence is required in computer crime
Suggested answer: C
asked 18/09/2024
Sneh Fields
46 questions

Question 36

Report Export Collapse

Which of the following statements about Internet user management is false?

Each user group can include multiple users and user groups
Each user group can include multiple users and user groups
Each user group can belong to multiple parent user groups
Each user group can belong to multiple parent user groups
The system has one by defaultdefaultUser group, which is also the system default authentication domain
The system has one by defaultdefaultUser group, which is also the system default authentication domain
Each user belongs to at least one user group and can also belong to multiple user groups
Each user belongs to at least one user group and can also belong to multiple user groups
Suggested answer: B
asked 18/09/2024
Jessica Martinada
41 questions

Question 37

Report Export Collapse

Which of the following does not belong toP2DRin the modelDetectionThe method used in the link?

real time monitoring
real time monitoring
detect
detect
Call the police
Call the police
shut down service
shut down service
Suggested answer: D
asked 18/09/2024
Mellisa Stroman
44 questions

Question 38

Report Export Collapse

Which of the following does not belong toLINUXoperating system?

CentOS
CentOS
RedHat
RedHat
Ubuntu
Ubuntu
MAC OS
MAC OS
Suggested answer: D
asked 18/09/2024
Myratgeldi Bekdurdyyev
50 questions

Question 39

Report Export Collapse

In some scenarios, it is necessary toIPAddress conversion, but also to the purposeIPaddress translation, which of the following techniques is used in this scenario?

two-wayNAT
two-wayNAT
sourceNAT
sourceNAT
NAT-Server
NAT-Server
NAT ALG
NAT ALG
Suggested answer: A
asked 18/09/2024
Chad Clark
50 questions

Question 40

Report Export Collapse

Which of the following protocols can guarantee the confidentiality of data transmission? (multiple choice)

Telnet
Telnet
SSH
SSH
FTP
FTP
HTTPS
HTTPS
Suggested answer: B, D
asked 18/09/2024
Manish Chaudhary
40 questions
Total 497 questions
Go to page: of 50