ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Which of the following options arePKIComponents of the architecture? (multiple choice)

A.
end entity
A.
end entity
Answers
B.
Certificate Authority
B.
Certificate Authority
Answers
C.
Certificate Registration Authority
C.
Certificate Registration Authority
Answers
D.
certificate store
D.
certificate store
Answers
Suggested answer: A, B, C, D

"observant"and"remain skeptical"Can help us better identify security threats in the online world

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

In tunnel encapsulation mode.IPSecThere is no need to have a route to the destination private network segment during configuration, because the data will be re-encapsulated to use the newIPThe header looks up the routing table.

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

aboutwindowsFirewall description, which of the following options are correct? (multiple choice)

A.
windowsThe firewall can only allow or prohibit preset programs or functions and programs installed on the system, and cannot customize the release rules according to the protocol or port number.
A.
windowsThe firewall can only allow or prohibit preset programs or functions and programs installed on the system, and cannot customize the release rules according to the protocol or port number.
Answers
B.
windowsThe firewall can not only allow or prohibit preset programs or functions and programs installed on the system, but also support its own custom release rules based on protocols or port numbers.
B.
windowsThe firewall can not only allow or prohibit preset programs or functions and programs installed on the system, but also support its own custom release rules based on protocols or port numbers.
Answers
C.
If you are settingwindowsDuring the firewall process, the Internet cannot be accessed. You can use the restore default function to quickly restore the firewall to its initial state.
C.
If you are settingwindowsDuring the firewall process, the Internet cannot be accessed. You can use the restore default function to quickly restore the firewall to its initial state.
Answers
D.
windows the firewall can also change the notification rules in a closed state
D.
windows the firewall can also change the notification rules in a closed state
Answers
Suggested answer: B, C

Which of the following statements about investigation and evidence collection is correct?

A.
Evidence is not necessarily required during the investigation
A.
Evidence is not necessarily required during the investigation
Answers
B.
Evidence obtained by wiretapping is also valid
B.
Evidence obtained by wiretapping is also valid
Answers
C.
Ideally, law enforcement agencies should be involved in all investigative and evidence-gathering processes
C.
Ideally, law enforcement agencies should be involved in all investigative and evidence-gathering processes
Answers
D.
Documentary evidence is required in computer crime
D.
Documentary evidence is required in computer crime
Answers
Suggested answer: C

Which of the following statements about Internet user management is false?

A.
Each user group can include multiple users and user groups
A.
Each user group can include multiple users and user groups
Answers
B.
Each user group can belong to multiple parent user groups
B.
Each user group can belong to multiple parent user groups
Answers
C.
The system has one by defaultdefaultUser group, which is also the system default authentication domain
C.
The system has one by defaultdefaultUser group, which is also the system default authentication domain
Answers
D.
Each user belongs to at least one user group and can also belong to multiple user groups
D.
Each user belongs to at least one user group and can also belong to multiple user groups
Answers
Suggested answer: B

Which of the following does not belong toP2DRin the modelDetectionThe method used in the link?

A.
real time monitoring
A.
real time monitoring
Answers
B.
detect
B.
detect
Answers
C.
Call the police
C.
Call the police
Answers
D.
shut down service
D.
shut down service
Answers
Suggested answer: D

Which of the following does not belong toLINUXoperating system?

A.
CentOS
A.
CentOS
Answers
B.
RedHat
B.
RedHat
Answers
C.
Ubuntu
C.
Ubuntu
Answers
D.
MAC OS
D.
MAC OS
Answers
Suggested answer: D

In some scenarios, it is necessary toIPAddress conversion, but also to the purposeIPaddress translation, which of the following techniques is used in this scenario?

A.
two-wayNAT
A.
two-wayNAT
Answers
B.
sourceNAT
B.
sourceNAT
Answers
C.
NAT-Server
C.
NAT-Server
Answers
D.
NAT ALG
D.
NAT ALG
Answers
Suggested answer: A

Which of the following protocols can guarantee the confidentiality of data transmission? (multiple choice)

A.
Telnet
A.
Telnet
Answers
B.
SSH
B.
SSH
Answers
C.
FTP
C.
FTP
Answers
D.
HTTPS
D.
HTTPS
Answers
Suggested answer: B, D
Total 497 questions
Go to page: of 50