ExamGecko
Home / Huawei / H12-711 / List of questions
Ask Question

Huawei H12-711 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

When connecting in a public place Wi-FiWhich of the following actions is relatively safer?

The connection is not encrypted Wi-Fihot spot
The connection is not encrypted Wi-Fihot spot
Connection is paid by the operator Wi-FiHotspot and web browsing only
Connection is paid by the operator Wi-FiHotspot and web browsing only
connect unencrypted for free Wi-Fimake online shopping
connect unencrypted for free Wi-Fimake online shopping
Connection encrypted for free Wi-FiPerform online transfer operations
Connection encrypted for free Wi-FiPerform online transfer operations
Suggested answer: B
asked 18/09/2024
Martin Lundgren
44 questions

Question 72

Report Export Collapse

Which of the following is an action to be taken during the summary phase of a cybersecurity emergency response? (multiple choice)

Establish a defense system and specify control measures
Establish a defense system and specify control measures
Evaluate the implementation of emergency plans and propose follow-up improvement plans
Evaluate the implementation of emergency plans and propose follow-up improvement plans
Judging the effectiveness of isolation measures
Judging the effectiveness of isolation measures
Evaluate members of emergency response organizations
Evaluate members of emergency response organizations
Suggested answer: B, D
asked 18/09/2024
Prinesh Chain
47 questions

Question 73

Report Export Collapse

Which of the following statements are true about port mirroring? (multiple choice)

The mirror port replicates the packets to the observing port
The mirror port replicates the packets to the observing port
The observing port sends the received packets to the monitoring device
The observing port sends the received packets to the monitoring device
The mirror port sends the received packets to the monitoring device
The mirror port sends the received packets to the monitoring device
The observing port replicates the packets to the mirroring port
The observing port replicates the packets to the mirroring port
Suggested answer: A, B
asked 18/09/2024
garima sharma
58 questions

Question 74

Report Export Collapse

Which of the following options isGREagreement number?

46
46
47
47
89
89
50
50
Suggested answer: B
asked 18/09/2024
Kevin Brigitta
33 questions

Question 75

Report Export Collapse

the following aboutVGMPWhich protocol description is wrong?

VGMPmultiple on the same firewallVRRPAll backup groups are added to one management group, and all backup groups are managed by the management group.VRRPbackup group
VGMPmultiple on the same firewallVRRPAll backup groups are added to one management group, and all backup groups are managed by the management group.VRRPbackup group
VGMPthrough the unified control ofVRRPSwitching the status of the backup group to ensure that allVRRPBackup group status is consistent
VGMPthrough the unified control ofVRRPSwitching the status of the backup group to ensure that allVRRPBackup group status is consistent
Status isActiveofVGMPThe group device will periodically sendhellomessage,stdandbyThe end is only responsible for monitoringhellomessage, will not respond
Status isActiveofVGMPThe group device will periodically sendhellomessage,stdandbyThe end is only responsible for monitoringhellomessage, will not respond
By default whenstandbyend threehelloThe message period does not receive the message sent by the peerhellomessage, it will think that the peer end is faulty, so it will switch itself toActivestate.
By default whenstandbyend threehelloThe message period does not receive the message sent by the peerhellomessage, it will think that the peer end is faulty, so it will switch itself toActivestate.
Suggested answer: C
asked 18/09/2024
Reydel Tabares Castro
52 questions

Question 76

Report Export Collapse

When A and B communicate with each other in data communication, if an asymmetric encryption algorithm is used for encryption, when A sends data to B, which of the following keys will be used for data encryption?

A's public key
A's public key
A's private key
A's private key
B's public key
B's public key
B's private key
B's private key
Suggested answer: C
asked 18/09/2024
Morten Sivertsen
33 questions

Question 77

Report Export Collapse

IPSec VPNAn asymmetric encryption algorithm is used to encrypt the transmitted data

True
True
False
False
Suggested answer: B
asked 18/09/2024
Hammad Chandio
36 questions

Question 78

Report Export Collapse

aboutGREEncapsulation and decapsulation, which of the following descriptions is false?

The encapsulation process, the original data packet is passed to theTunnelDepart after the interfaceGREpackage
The encapsulation process, the original data packet is passed to theTunnelDepart after the interfaceGREpackage
packaging process, afterGREAfter the module is encapsulated, this packet will enterIPmodule for further processing
packaging process, afterGREAfter the module is encapsulated, this packet will enterIPmodule for further processing
The decapsulation process, the destination receivesGREAfter the message, the data packet is delivered to theTunnelDepart after the interfaceGREDecapsulation
The decapsulation process, the destination receivesGREAfter the message, the data packet is delivered to theTunnelDepart after the interfaceGREDecapsulation
Decapsulation process, afterGREAfter the module is decapsulated, this packet will go inIPmodule for further processing
Decapsulation process, afterGREAfter the module is decapsulated, this packet will go inIPmodule for further processing
Suggested answer: B
asked 18/09/2024
Ali Reza Farahnak
56 questions

Question 79

Report Export Collapse

The repair of anti-virus software only needs to repair some system files that were accidentally deleted when scanning and killing viruses to prevent the system from crashing

True
True
False
False
Suggested answer: A
asked 18/09/2024
Mareah Allawi
39 questions

Question 80

Report Export Collapse

Which of the following does not fall into the category of cybersecurity incidents?

Major cybersecurity incident
Major cybersecurity incident
Special Cybersecurity Incident
Special Cybersecurity Incident
General cybersecurity incidents
General cybersecurity incidents
Major cybersecurity incident
Major cybersecurity incident
Suggested answer: B
asked 18/09/2024
Jordi Nogués
42 questions
Total 497 questions
Go to page: of 50