ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











According to the number of users operating at the same time, the operating system can be divided into single-user operating system and multi-user operating system. Which of the following items is not a multi-user operating system?

A.
UNIX
A.
UNIX
Answers
B.
OS/2
B.
OS/2
Answers
C.
Linux
C.
Linux
Answers
D.
MSDOS
D.
MSDOS
Answers
Suggested answer: B, D

With the development of technology, some new technologies have emerged in electronic forensics.

Which of the following items are new forensics technologies?

A.
Cloud Forensics
A.
Cloud Forensics
Answers
B.
IoT Forensics
B.
IoT Forensics
Answers
C.
Side-Channel Attack Forensics
C.
Side-Channel Attack Forensics
Answers
D.
Log forensics
D.
Log forensics
Answers
Suggested answer: A, B, C

In anti-virus software, ( ) technology can analyze compressed files, added flowers, and packaged files.

(fill in the blank)

A.
Shelling
A.
Shelling
Answers
Suggested answer: A

If we do not want to generate a reverse Server Mapi entry when configuring NAT Server, we need to add a parameter when configuring NATServerE. This parameter is ( ) (fill in the blank)

A.
no-reverse
A.
no-reverse
Answers
Suggested answer: A

The interface on the firewall cannot forward traffic until it is added ( ). (fill in the blank)

A.
Security Domain
A.
Security Domain
Answers
Suggested answer: A

Explanation:

Domain

Explanation:

The protocol number of the transport layer protocol TCP is ( ) (fill in the blank)

A.
6
A.
6
Answers
Suggested answer: A

Understanding engineering principles belongs to ( ) the category of security awareness training in information security prevention. (fill in the blank)

A.
Security
A.
Security
Answers
Suggested answer: A

Heartbeat message (He11o message): The two FWs send heartbeat messages to each other periodically (the default period is ( ) seconds) to check whether the peer device is alive. (fill in the blank)

A.
1
A.
1
Answers
Suggested answer: A

In symmetric encryption algorithms, the algorithm is generally used on data communication channels, browsers or network links (). (fill in the blank)

A.
Stream cipher encryption
A.
Stream cipher encryption
Answers
Suggested answer: A

We should choose the encryption algorithm according to our own use characteristics. When we need to encrypt a large amount of data, it is recommended to use the () encryption algorithm to improve the encryption and decryption speed.

(fill in the blank)

A.
Symmetry
A.
Symmetry
Answers
Suggested answer: A
Total 497 questions
Go to page: of 50