ExamGecko
Home Home / Huawei / H12-711

Huawei H12-711 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











When connecting in a public place Wi-FiWhich of the following actions is relatively safer?

A.
The connection is not encrypted Wi-Fihot spot
A.
The connection is not encrypted Wi-Fihot spot
Answers
B.
Connection is paid by the operator Wi-FiHotspot and web browsing only
B.
Connection is paid by the operator Wi-FiHotspot and web browsing only
Answers
C.
connect unencrypted for free Wi-Fimake online shopping
C.
connect unencrypted for free Wi-Fimake online shopping
Answers
D.
Connection encrypted for free Wi-FiPerform online transfer operations
D.
Connection encrypted for free Wi-FiPerform online transfer operations
Answers
Suggested answer: B

Which of the following is an action to be taken during the summary phase of a cybersecurity emergency response? (multiple choice)

A.
Establish a defense system and specify control measures
A.
Establish a defense system and specify control measures
Answers
B.
Evaluate the implementation of emergency plans and propose follow-up improvement plans
B.
Evaluate the implementation of emergency plans and propose follow-up improvement plans
Answers
C.
Judging the effectiveness of isolation measures
C.
Judging the effectiveness of isolation measures
Answers
D.
Evaluate members of emergency response organizations
D.
Evaluate members of emergency response organizations
Answers
Suggested answer: B, D

Which of the following statements are true about port mirroring? (multiple choice)

A.
The mirror port replicates the packets to the observing port
A.
The mirror port replicates the packets to the observing port
Answers
B.
The observing port sends the received packets to the monitoring device
B.
The observing port sends the received packets to the monitoring device
Answers
C.
The mirror port sends the received packets to the monitoring device
C.
The mirror port sends the received packets to the monitoring device
Answers
D.
The observing port replicates the packets to the mirroring port
D.
The observing port replicates the packets to the mirroring port
Answers
Suggested answer: A, B

Which of the following options isGREagreement number?

A.
46
A.
46
Answers
B.
47
B.
47
Answers
C.
89
C.
89
Answers
D.
50
D.
50
Answers
Suggested answer: B

the following aboutVGMPWhich protocol description is wrong?

A.
VGMPmultiple on the same firewallVRRPAll backup groups are added to one management group, and all backup groups are managed by the management group.VRRPbackup group
A.
VGMPmultiple on the same firewallVRRPAll backup groups are added to one management group, and all backup groups are managed by the management group.VRRPbackup group
Answers
B.
VGMPthrough the unified control ofVRRPSwitching the status of the backup group to ensure that allVRRPBackup group status is consistent
B.
VGMPthrough the unified control ofVRRPSwitching the status of the backup group to ensure that allVRRPBackup group status is consistent
Answers
C.
Status isActiveofVGMPThe group device will periodically sendhellomessage,stdandbyThe end is only responsible for monitoringhellomessage, will not respond
C.
Status isActiveofVGMPThe group device will periodically sendhellomessage,stdandbyThe end is only responsible for monitoringhellomessage, will not respond
Answers
D.
By default whenstandbyend threehelloThe message period does not receive the message sent by the peerhellomessage, it will think that the peer end is faulty, so it will switch itself toActivestate.
D.
By default whenstandbyend threehelloThe message period does not receive the message sent by the peerhellomessage, it will think that the peer end is faulty, so it will switch itself toActivestate.
Answers
Suggested answer: C

When A and B communicate with each other in data communication, if an asymmetric encryption algorithm is used for encryption, when A sends data to B, which of the following keys will be used for data encryption?

A.
A's public key
A.
A's public key
Answers
B.
A's private key
B.
A's private key
Answers
C.
B's public key
C.
B's public key
Answers
D.
B's private key
D.
B's private key
Answers
Suggested answer: C

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

aboutGREEncapsulation and decapsulation, which of the following descriptions is false?

A.
The encapsulation process, the original data packet is passed to theTunnelDepart after the interfaceGREpackage
A.
The encapsulation process, the original data packet is passed to theTunnelDepart after the interfaceGREpackage
Answers
B.
packaging process, afterGREAfter the module is encapsulated, this packet will enterIPmodule for further processing
B.
packaging process, afterGREAfter the module is encapsulated, this packet will enterIPmodule for further processing
Answers
C.
The decapsulation process, the destination receivesGREAfter the message, the data packet is delivered to theTunnelDepart after the interfaceGREDecapsulation
C.
The decapsulation process, the destination receivesGREAfter the message, the data packet is delivered to theTunnelDepart after the interfaceGREDecapsulation
Answers
D.
Decapsulation process, afterGREAfter the module is decapsulated, this packet will go inIPmodule for further processing
D.
Decapsulation process, afterGREAfter the module is decapsulated, this packet will go inIPmodule for further processing
Answers
Suggested answer: B

The repair of anti-virus software only needs to repair some system files that were accidentally deleted when scanning and killing viruses to prevent the system from crashing

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: A

Which of the following does not fall into the category of cybersecurity incidents?

A.
Major cybersecurity incident
A.
Major cybersecurity incident
Answers
B.
Special Cybersecurity Incident
B.
Special Cybersecurity Incident
Answers
C.
General cybersecurity incidents
C.
General cybersecurity incidents
Answers
D.
Major cybersecurity incident
D.
Major cybersecurity incident
Answers
Suggested answer: B
Total 497 questions
Go to page: of 50